MENU

Chapter 9 Societal Impacts of IT Solutions

Question - 11 : -
If your computer attacked by a trojan horse virus, what damage it may cause?

Answer - 11 : -

If your computer attacked by a trojan horse virus, it can:

  1. Steal passwords
  2. Copy sensitive data
  3. Carry out any other harmful operations etc.

Question - 12 : - Write minimum three ways by which a virus can spread to other systems.

Answer - 12 : -

Three ways by which a virus can spread to other systems are as follows:

  • When an infected file is copied through network.
  • When virus file is downloaded from Internet.
  • When infected file is copied from floppy disk, USB, DVD etc.

Question - 13 : - Write any two tips to avoid spams.

Answer - 13 : -

You can use the following guidelines to avoid spam, they are as follows:

  1. Keep your E-mail address private.
  2. Using appropriate filters to find and alter you about spam.

Question - 14 : - What precaution you should take before copying file from an external storage media?

Answer - 14 : - Precaution should be taken to run an antivirus program before copying any file from floppy disk, USB, DVD etc. Also, we have to run antivirus program weekly to scan all the drives in the system.

Question - 15 : - Define information security.

Answer - 15 : - Information security is all about protecting and preserving information. It’s all about protecting and preserving the confidentiality, integrity, authenticity, availability and reliability of information.

Question - 16 : - List two advantages of online backup.

Answer - 16 : -

Two advantages of online backup are as follows:

  1. By having your data stored on a remote hard drive, you run little as there is no risk of losing your data as a result of fire, theft or any other disaster.
  2. No hardware is needed to maintain or repair the backup.

Question - 17 : - Why should we frequently take backup of our data?

Answer - 17 : -

We frequently take backup of our data because

  1. The hard drive of our computer may fail.
  2. The data on our computer may get corrupted for a variety of reasons.
  3. Data loss due to fire, natural disasters etc.

Question - 18 : -
Name one specific software/tool for each of the following categories:

  • Antivirus software
  • Data recovery tool
  • Online backup tool

Answer - 18 : -

  • Antivirus software – Quick Heal
  • Data recovery tool – NTFS Reader
  • Online backup tool – Dropbox

Question - 19 : - What are the common symptoms of a virus attack?

Answer - 19 : -

Symptoms of Computer Viruses Attack
The list of symptoms of computer viruses attack, which indicate that your system is infected with a computer viruses are as follows:

  1. Odd messages are displaying on the screen.
  2. Some files are missing.
  3. System runs slower.
  4. PC (Personal Computer) crash or restart again and again.
  5. Drives are not accessible.
  6. Antivirus software will not run or installed.
  7. Unexpected sound or music plays.
  8. The mouse pointer changes its graphic.
  9. Receive strange E-mails containing odd attachments or viruses.
  10. PC starts performing functions like opening or closing windows, running programs on its own.

Question - 20 : - What are the various measures that should be taken to prevent spyware from overtaking your system?

Answer - 20 : -

Preventions of Spyware
Due to the seriousness of spyware and the harm, it can affect your system and personal information, it is highly recommended you to take the given measures to prevent spyware from overtaking your system:
Download and install anti-spyware software: Most antivirus applications are effective in identifying different types of malware, including spyware, but may not detect all spyware variants. Once you install the anti-spyware software on your computer, you must keep your anti-spyware application updated to keep up with the latest forms of spyware.
Be cautious when Web surfing: The best defense against spyware is not to download it in the first place. Spyware is often installed on your computer when you visit an infected or malicious Website.
Therefore, you should exercise caution with links to Websites from unknown sources. In addition, you should only download programs from trustful Websites. When downloading a specific program, ensure that you are not downloading pirated software. Spyware can be distributed by exploits, that promote software piracy.
Lookout for pop-ups: Malware can lure you into installing spyware on your computer by prompting you with a pop-up window. If you see an unwanted or random pop-up alert, do not click “Agree” or “OK” button to close the pop-up window. This will actually install the malware on your computer. Instead, press Alt + F4 or click on the red “X” on the corner on the pop-up alert to close the window.
Keep current with operating system updates: Important system updates provide significant benefits such as improved security. Just as with any antivirus and anti-spyware software, not keeping up with operating system updates will make your PC vulnerable to the latest malware threats.
Harden your browser settings: Updated Web browsers may help to prevent exploitation by taking several defensive steps against spyware. Most Web browsers will warn you of executable programs and will suggest a safe course of action. In addition to having an updated Web browser, ensure that you have properly configured your browser and that all of your plug-ins and add-ons are updated, including Java, Flash and Adobe products.
Enable your firewall: Firewalls monitor the network and are capable of blocking suspicious traffic, which can prevent spyware from infecting your system.

Free - Previous Years Question Papers
Any questions? Ask us!
×