NCERT Solutions for Class 9th: Ch 6 Security threats and Safety Measures Computer Science
ExcerciseA. Multiple Choice Questions:
1. Which of the following is an anti-virus program
(a) Norton
(b) Quick heal
(c) K7
(d) All of these
► (d) All of these
2. All of the following are examples of real security and privacy threats except:
(a) Hackers
(b) Spam
(c) Virus
(d) Worm
► (a) Hackers
3. Trojan horses are very similar to virus in the matter that they are computer programs that replicate copies of themselves.
(a) True
(b) False
► (b) False
4._____________ monitors user activity on internet and transmit that information in the background to someone else.
(a) Malware
(b) Adware
(c) Spyware
(d) None of these
► (c) Spyware
5. Viruses are__________.
(a) Man made
(b) Naturally occur
(c) Machine made
(d) All of the above
► (a) Man made
6. Firewall is a type of ____________.
(a) Virus
(b) Worm
(c) Security threat
(d) None of the above
►(d) None of the above
7. Unsolicited commercial email is knownas ____________.
(a) Spam
(b) Virus
(c) Malware
(d) Spyware
► (a) Spam
B. Match the following
(1) | Virus | (a) | “Get Rich Quick” Scheme |
(2) | Worm | (b) | Cool Web Search |
(3) | Trojan Horse | (c) | I Love You |
(4) | Spyware | (d) | Jerusalem |
(5) | Spam | (e) | Wazzo |
Answer
(1) | Virus | (a) | Wazzo |
(2) | Worm | (b) | Jerusalem |
(3) | Trojan Horse | (c) | I Love You |
(4) | Spyware | (d) | Cool Web Search |
(5) | Spam | (e) | “Get Rich Quick” Scheme |
C. Answer the following questions:
1. While working on the computer, you notice that the system is working very slowly, files are corrupted, default home page on the web browser has changed, lot memory is consumed, and unnecessary pop-ups are coming. What can be the probable reason?
Answer
The computer gets infected from Spyware. It monitors user activity on the Internet and transmits that
information in the background to someone else. Spyware can also gather information about e-mail addresses and even passwords and credit card numbers. It also sends information back to the spy ware’s home base via the user’s Internet connection, thus it eats user’s internet bandwidth.
2. You have very important data on your computer. How will you ensure that this data remainssafe?
Answer
We can make our important data safe on computer through below steps:
1. Using Security software such as Norton antivirus, Symantec etc.
2. Beware of email attachments form unknown sources
3. Do not randomly download material from websites which has not been checked for security.
3. Never propagate hoax or chain emails.
4. Frequently back up important data and files.
5. Use encryption or sites that use encrypted data.
3. Differentiate between virus, worms and Trojan horses.
Answer
Virus- A computer virus is a program usually hidden within another simple program. It produces copies of itself and inserts them into other programs or files, in turn destroying the data and performing other malicious actions. Computer viruses are never naturally occurring; they are always man-made.
Worms- Worms are very similar to viruses in the manner that they are computer programs that
replicate copies of themselves (usually to other computer systems via network connections). Unlike viruses, worms exist as separate entities; they do not attach themselves to other files or programs.
Torjan Horses- A Trojan horse is a program that claims to rid your computer of viruses but instead
introduces viruses into the system. The Trojan program does not attach itself to the files like a virus nor replicate itself like a worm but it does provide unauthorized access to user’s computer. They are mostly spread through internet downloads and online gaming programs. They mostly affect the targeted computers.
4. How is a hacker different from a cracker?
Answer
Hackers are gifted programmers who gain access to the systems or network to show case the security loopholes to the administrators.
Cracker is an activist who had intentions of doing malicious activities. Crackers have an end goal of destroying data and network for personal monetary gains.
Notes of Chapter 6 Security threats and Safety Measures
Go To Chapters