Q. 194801 What is a trojan horse and how is it spread?
Right Answer is:
SOLUTION
Trojan horse is similar to a virus, except that it does not replicate itself. It stays in the computer doing its damage or allows somebody from a remote site to take control of the computer.
The ways of spreading a trojan horse are:
• Copying
• Downloading free software from websites
• Receiving a trojan horse as an email attachment
• Catching a trojan horse from a chat room or instant messaging service.
Q. 194802 Why is online backup necessary?
Right Answer is:
SOLUTION
We need online backup for the following reasons:
• The risk of data loss as a result of file corruption, fire, theft or other natural disasters is practically eliminated.
• We can safely access or restore any lost files by using any PC with high-speed internet connection and a web browser interface.
• Privacy and security are assured with encryption and password protection.
Q. 194803 Write the advantages and disadvantages of differential backup.
Right Answer is:
SOLUTION
The advantages and disadvantages of differential backup are:
Advantages:
• Differential backups require lesser disk, tape or network drive space.
• Backup time is faster than for full or incremental backups.
Disadvantage:
• Restoring all your files may take considerably longer because you may have to restore both the last differential and full backup.
Q. 194804 How does an antivirus help you?
Right Answer is:
SOLUTION
Antivirus helps us in the following way:
• Protects our PC against the latest viruses, spyware, and other threats.
• Delivers fast, powerful online protection which safeguards us from cyber attacks.
• We can chat, email and share files without worry.
• Updates automatically, offers easy-to-use features and includes free customer support during your subscription period.
Q. 194805 Discuss Hacking and Cracking.
Right Answer is:
SOLUTION
The two major threats to security of software and informationresources are: a)Hacking b)Cracking
Hacking refers to the attempts to gain information from undisclosed areas. Mostly hackers hack systems with malicious intent and damage some important system information.
Software cracking is the modification of software to remove protection methods – copy protection, trial/demo version, serial number, hardware key, date checks and CD check.
Q. 194806 What is online backup?
Right Answer is:
SOLUTION
Online backup is a method in which your documents, files, folders or even the entire contents of a hard drive are regularly backed up on a remote server or computer with a network connection. Online backup stores your data at different location in different countries. As a result, it is impossible to lose data due to natural disaster. So, there is no risk in losing the data.
Q. 194807 Why do you need firewall protection?
Right Answer is:
SOLUTION
It is a system designed to prevent unauthorised access from a private network. Firewalls can be implemented in both hardware and software or a combination of both. Firewalls are frequently used to prevent unauthorised internet users from accessing private networks connected to the internet, especially intranets. All messages entering or leaving the intranet pass through the firewall and examines each message and blocks that do not meet the specified security criteria.
Q. 194808 State True and False:
i. Melissa.A is a boot sector virus.
ii. A trojan horse is a computer program which carries out malicious operations without the user’s knowledge.
iii. A true virus can infect another system without human intervention.
Right Answer is:
SOLUTION
i. False
ii.True
iii.False
Q. 194809 Fill in the blanks:
i. VIRUS stands for_____________.
ii. The utility programs which tale action against virus is called_________.
iii. _________is a computer program which carries out malicious operations without the user’s knowledge.
[1+1+1 = 3 ]
Right Answer is:
SOLUTION
i. Vital Information Resource Under Seize
ii. anti-virus
iii. Trojan Horse
Q. 194810 Fill in the blanks:
i. __________is the software that is downloaded on your computer to track your activities without your knowledge.
ii. ____________ and _____________ are the two types of malware.
iii. Unlike a computer virus, a _________ can replicate itself automatically.
Right Answer is:
SOLUTION
i. Spyware
ii. Viruses, Trojans
iii. worm
Q. 194811 What is antivirus and how does it protect your computer?
Right Answer is:
SOLUTION
Antivirus is a software that searches the hard drive and floppy disks for any viruses. The market for this kind of program has expanded because of the internet growth.
Antivirus software will not protect you against:
• programs that we choose to install that may contain unwanted features.
• spam.
• any kind of online fraud or criminal activity.
• a hacker trying to break your computer over the internet.
• it will not be effective if it is switched off.
• it will be less effective if not updated with the latest signature.
Q. 194812 How long does online backup services or remote backup take?
Right Answer is:
SOLUTION
High-speed internet connections will obviously speed up the time it takes to back up your files and folders. Dial-up internet users could face longer times but if they do incremental backups and schedule effectively, they can save time.
Initial backups can take from hours to days depending on the volume and size of the data that is required to back up. That's why many people take this during off-peak hours or even weekends. Time taken for subsequent and routine backups will be much shorter once the first backup is complete as only the changes or new documents will need to be copied and stored.
Q. 194813 Explain the concept of differential backup with an example.
Right Answer is:
SOLUTION
Differential backup creates a backup of files that have changed since a full backup was performed. A differential backup typically saves only the files that are different or new since the last full backup, but this can vary in different backup programs. Together a full backup and a differential backup includes all the files on your computer.
A differential backup might be done as follows:
• Monday perform a full backup and save the file set.
• Tuesday perform a differential backup using the same file set. All files that have changed since the full backup are backed up in the differential backup.
• Wednesday perform a differential backup using the same file set. All the files that have changed since Monday’s full backup are backed up.
Advantages:
• Differential backups require lesser disk, tape or network drive space than incremental backups.
• Backup time is faster than for full or incremental backups.
Disadvantages:
• Restoring all your files may take considerably longer because you may have to restore both the last differential and full backup.
• Restoring an individual file may take longer because you have to locate the file on either the differential or full backup.
Q. 194814 State True or False:
i. Unsolicited bulk emails are called spam.
ii. File infectors virus infects .COM and .EXE files.
iii. The antivirus should not be updated regularly to retain its effectiveness.
iv Logic bomb is a malware. [1+1+1+1 = 4]
Right Answer is:
SOLUTION
i. True ii. True iii. False
iv. True
Q. 194815 Multiple Choice Questions (Choose most appropriate option)
i. To avoid problems while working with internet you should follow these precautions:
a) Install anti-Virus on your computer.
b) Take the back-up of your files regularly.
c) Do not click on unknown links.
d) All of the above.
ii. An independent computer program that copies itself from one computer to other in a network is called:
a) Bug.
b) Anti Virus.
c) Worm.
d) Trojan.
iii. Identify the appropriate spyware
a) File does not open.
b) Online attackers.
c) File is hidden.
d) Disk does not response.
iv. Data recovery means
a) Getting back the storage device.
b) Storage of Data.
c) Transfer of Data.
d) Getting back the lost data.
v. The common Trojan horse virus is an
a) e-mail attachment
b) e-commerce site
c) e-shopping attachment
d) e-group program.
Right Answer is:
SOLUTION
i.d
ii.c
iii.b
iv.d
v.a
Q. 194816 State True and False
a) A true virus can infect another system without human intervention.
b) Micro viruses are created through application programs.
c) Logic bomb is a malware.
d) Worm is a self replicated virus.
e) Spying means that people should be updated regularly about emails which they haven’t actually asked for.
f) Melissa.A is a boot sector virus.
Right Answer is:
SOLUTION
a) False.
b) True.
c) True.
d) True.
e) False.
f) False
Q. 194817 Fill in the blanks:
a) Trojan horse is a_______.
b) _______affects the boot sector of a floppy or hard disk.
c) The utility programs which take action against viruses are called______.
d) _________ is a generic term of bad software.
e) The most common form of spam is unwanted _________.
f) Logic bomb is a___.
Right Answer is:
SOLUTION
a) virus
b) Boot virus
c) Anti-virus
d) Malware
e) e-mail
f) malware
Q. 194818 Answer the following questions:
i. Madhav Shastri is working for Deloitte, where he needs to backup his data of around 200 MB to 400 MB at the end of each day. Each day backup needs to archived separately for future reference. Suggest any two economic data backup devices, which he can use for this purpose.
ii. Differentiate between Spyware and Malware.
iii. Name one specific software/tool for each of the following category:
a. Anti-virus
b. Online Backup Tool
c. Open Source Web Browser
d. Text Editor to create HTML pages
e. Data Recovery Tool [2+2+5 = 9]
Right Answer is:
SOLUTION
i. CD and DVD
ii. Spyware is a type of malware that is installed on computers and collects information about users without their knowledge. The presence of spyware is typically hidden from the user. Typically, spyware is secretly installed on the user’s personal computer. Whereas, anti-virus software is a computer program that detects, prevents and takes action to disarm or remove malicious software programs such as viruses and worms.
iii. One specific software/tool for each of the following category are: a. Anti-Virus – Symantec Norton anti-virus
b. Online Backup Tool – SOS Online Backup
c. Open Source Web Browser – Mozilla Firefox
d. Text Editor to create HTML pages – Notepad2
e. Data Recovery Tool – Zlon
Q. 194819 Answer the following questions:
(a) What does a malware contain?
(b) What do you mean by hacker?
(c) Define E-commerce.
(d) Mention any two societal impacts of IT.
(e) If your computer is attacked by a Trojan horse virus, what damage can it cause?
Right Answer is:
SOLUTION
(a) A malware includes computer viruses, worms, trojan horses, spyware, crimeware and other malicious and unwanted softwares.
(b) Hacker means an expert computer programmer who enjoys figuring out the inner workings of computer systems or networks. Some have a reputation for using their expertise to illegally break into secure programs in computers hooked up to the internet or other networks.
(c) E-Commerce is the buying and selling of products and services by businesses and consumers over the Internet.
(d) The societal impacts of IT are:
• Opportunities for people with disabilities due to artificial intelligence.
• Quality of life improved due to e-commerce over Internet.
(e) If your computer is attacked by a Trojan horse virus, it can
• steal passwords,
• copy sensitive data and
• carry out any other harmful operations.
Q. 194820 If you want to select current record (row) without using mouse, you will use
A. Ctrl + Spacebar.
B. Shift+ Alt.
C. Shift + Spacebar.
D. Shift + Ctrl.
Right Answer is: C
SOLUTION
The shortcut key to select current record (row) is shift + spacebar. To select multiple records, press Shift + spacebar and Shift + up arrow or Shift + down arrow.