Page 1 :
CHAPTER, , 9g Caring for your Computer, , Fastrack REVISION, , , , > Care and Maintenance of Computer: A large number of files, are stored in the computer. These files can be disorganised and, Fragmented and may result in slowing down of the system. Regular, maintenance of the system includes installing updates, security, checks, taking backups, virus scans, etc., > Both internal and external components of the computer system, should be maintained properly. Preventive maintenance increases, the life of the components., >» Computer Maintenance Ac!, activities are as follows:, > Always keep the computer parts clean by wiping them with, adry cloth., > Keep food items away from the computer,, > Replace or repair the hardware that is not functioning, properly., > Install antivirus software and update it regularly., > Cleaning of Computer: General precautions that can be taken, while cleaning the computer components are as follows:, > Always switch off the computer system before cleaning., > Never spray cleaning fluid directly on the components of the, computer. First, spray the liquid on the lint-free cloth and, then wipe the component., > Donotallow the cleaning Fluid to drip near the circuit board., > Never use a regular vacuum to capture the dust (only use an, anti-static computer vacuum)., > Donot attempt to clean the inside of a computer monitor., > Cleaning Peripheral Device: Following are the ways to clean a few, common peripheral devices of a computer., > Keyboard: Dirt and dust can cause damage to the keyboard., Keys of the keyboard may not function properly if dirt enters, them. You should always clean the keyboard periodically., Always disconnect the keyboard from the computer before, cleaning it., > Monitor: To clean the computer monitor, first disconnect, it from the computer system. This not only lowers the risk, of electrocution, but allows us to see dust and grime on the, screen more easily. Now, wipe the dust off with a dry cloth., You can use a soft lint-free cloth, like cotton to wipe., > Optical Mouse: Disconnect the optical mouse from the, computer system. The cleaning process requires turning, the mouse over as viewing the underside of an operational, optical mouse may be injurious to the eyes. Clean the bottom, of the optical mouse with a clean lint-free cloth., > Disk Drives: While the CD/DVD tray is open, use compressed, air to gently clean out the dust. Avoid using too high a, Pressure as it may cause damage to its internal components., , , , ies: A few computer maintenance, , > Preparing Maintenance Schedule: Computer is a machine. Like, other machines, regular maintenance of a computer system is very, important., , , , By running anti-malware programs, deleting files as needed and, cleaning out the dust on a computer, you can prolong the lifespan, of your computer by years and use it efficiently too., ‘A few of the maintenance tasks to be performed to get the most, out of your computer are:, > Daily:, > Take backup of your data at least once per day., > Run antivirus software daily for virus prevention., > Check for updates everyday so that you do not miss any, crucial upgrades., > Monthly:, > Use the defragmentation tool to keep your computer, running fast and efficiently., Scan your hard drive For errors to make sure that there are, no physical problems occurring., Clean out the disk drive every few weeks. This is similar, to defragmentation, these are small pieces of trash that, quietly accumulate over time., > Yearly:, > Backup your hard drive as an image, so if your computer, ever crashes you would not have to reinstall from scratch., This should be done twice a year, just to be safe., > Clean your computer. This goes beyond simply using, compressed air and actually opening it up to get rid of all of, the smaller bits and pieces of dirt stuck in there., > Renew the antivirus subscription., > AsNeeded:, > Uninstall programs that you do not use anymore to free up, space., >» Practice safe browsing by not downloading files from or, spending time on sites you are not Familiar with, change, passwords frequently as a general preventive measure, against hackers., > Computer Virus: The term VIRUS stands for Vital Information, Resource Under Seize. A computer virus is similar to a biological virus., A computer virus is a program or piece of code that is loaded on, to your computer without your knowledge and runs against your, wishes. A computer virus can easily attach itself to other files and, programs., > How does a Computer Virus Attack and Spread?: The major, source of a computer virus attack is the Internet. A virus can enter, your computer without your knowledge when you do normal web, activities, For example,, > Sharing music, files or photos with other users, > Visiting an infected website, > Opening a spam e-mail or an e-mail attachment, > Downloading free games, media players and other system, utilities, Installing mainstream software applications without reading, license agreements thoroughly, , y, , Y, , v
Page 2 :
44 | MASTERMIND CHAPTERWISE Question Bank, , > Hazards Caused by a Computer Virus: As a computer virus is a, program ora piece of code, some computer viruses are programmed, to harm a computer by damaging programs, deleting files, or even, reformatting the hard drive., , > Symptoms of a Computer Virus: Some of the common symptoms, that are exhibited by a computer, in case of a virus attack, are as, follows:, , > Unusual messages start appearing on the screen while, working., > The computer tends to run slower than the normal., > The space on the disk is reduced., > Applications take a long time to load and may not work, properly., » Files on the computer start missing and vanish., > The hard disk has more files than it had earlier., > Types of Computer Virus: There are many different types of, computer viruses. They infect the computer in different ways, The, different types of viruses along with their description that can, harm the data and information stored in a computer, are as follows:, > Resident viruses: They are permanent viruses that reside, in the RAM of a system. They can interfere and disturb the, normal working of a computer. They can corrupt files and, currently used applications in a computer. Some examples, of such viruses are Jerusalem, Onehalf, Magistr, Junkie and, Satanbug., Non-resident viruses: They are similar to the Resident, viruses except that these do not reside in the RAM of a, ‘system, rather reside in a module of a program. It may select, one or more files to infect, each time the module is executed., Program viruses: These infect the files with the extension, -EXE, COM, .SYS, .OVL and .SCR. The program files are used, by the virus as they are easy to attack and they have simple, Format to which the virus can attach itself. When the infected, file is executed, the virus becomes active. Some examples of, these viruses are Sunday and Cascade., Macro viruses: Macro language is used in the Macro virus,, . for its programming. It is a set of commands written by the, , , , user to be executed later. Data files are affected by these, viruses. Macro viruses spread rapidly since the users share, the infected documents. Some examples of these viruses are, Concept and Nuclear., , » Trojan horse: For passing the user's data to someone else, this virus is used. It is a program which appears to be useful,, Confidential information is stolen and passed using this virus,, A Trojan horse enters the computer with the help of the, users. The users install it under the wrong impression that it, is a useful and harmless program., , > Malware: t refers to the program which harms the computer,, and comes into the computer without the user’s consent,, Malware is the short name of Malicious Software. It slows, down the computer and networks. It is actively destructive, and annoying., , > Spyware: Spyware is a kind of malware that is sent to, someone's computer intentionally to steal information such, as e-mail passwords, credit card password, etc., , > Worms: This virusisa program which is capable of reproducing, and spreading itself to another computer system with the, help of the computer network. This type of virus does not, cause direct damage to the files and the programs. Large, amount of memory and network is used by this type of virus,, thus, make difficult For the users to work on the network., , » Boot virus: The boot records of hard disk are infected by this, virus. These viruses are more dangerous than the program, virus. Some examples of these viruses are Disk killer and, Stoned virus., , > Protecting Computer against Viruses: The following are some, points that you should keep in mind to safeguard your computer, system against virus attacks:, , > Do not install and run pirated software on your computer., , > Install an antivirus software on to your computer and keep, , it updated., , > Avoid copying and using files coming From unreliable, sources., , >, , Restrict the access to your system, both online and offline., , , , , , ” Multiple Choice Questions, , Q1 Which of the following is not a computer maintenance, activity?, a. Take regular backup of data., b. Keep food items on the computer table., ¢ Cables and chords should not be messed up,, d, Always shut down the computer properly., Ans. (b) Keep food ites on the computer table., , Q2. Which of the following general precaution should not be, , taken care of while cleaning the computer components?, a. Always switch on the computer system before cleaning., , b. Never spray cleaning fluid directly on the components of !, , the computer., c. Do not attempt to clean the inside of a computer monitor,, d, Never use a regular vacuum to capture the dust,, Ans. (a) Always switch on the computer system before cleaning,, , Objective TYPE QUESTIONS, , Q3. What is the full form of VIRUS?, a. Vital Information Resource Under Seize, b. Vast Information Resource Under Seize, ¢. Vital Information Record Under Seize, d, None of the above, Ans. (a) Vital Information Resource Under Seize, , Q4. Which of the following viruses resides in the RAM of a, computer system?, a. Non-resident virus, ©. Boot sector virus, Ans. (b) Resident virus, , Q5. Which of the following viruses can infect an Excel document?, a, Boot viruses, , b. Resident virus, d. Creeper virus, , b. Program virus, , ¢. Macro virus d. All of these, , Ans, (b) Program virus
Page 3 :
Q6. Which of the fo, , the hard disk?, a. Macro b. Malware, ©, Boot virus d, Worm, , Ans. (c) Boot virus, Q7. Which of the followin,, a. Quick Heal Total, b. Norton antivirus, © MCAfee antivirus, d, All of the above, Ans. (d) All of the above, Q8. Which of the following antivirus, a. Kaspersky antivirus, b. Quick Heal Totat Security, ©. Microsoft Security Essentials, d. Norton antivirus, Ans. (c) Microsoft Security Essentials, Q9. Which of the followin:, company?, a. Kaspersky, C. 360 Total Security, Ans. (c) 360 Total Security, Q10. When cleaning any of the com, "computer, which method would, , hair around their computer on, keyboard?, , a. Users can use a vacuum, b. Users can use a damp cloth with water, ¢ Users can use a feather duster, d. All of the above, Ans. (a) Users can use a vacuum, Q1L What should you never do when cleaning a computer?, a. Never use a vacuum cleaner, b. Never unplug the electricity, ¢. Never eat or drink around the computer, d. All of the above, Ans. (c) Never eat or drink around the computer, Q12. When cleaning a component and/or the computer, what, should you do before you clean it?, a. Leave it in standby mode, b. Leave the computer running while you are cleaning, ¢ Turn the computer on, then clean it, d. Turn it off from the power switch, Ans. (d) Turn it off from the power switch, 913. Why should you be cautious when usin, solvents?, @. You don't use cleaning solvents because it is dangerous., b. Cleaning solvents are not to be used on com,, are toxic., ©. You don't use cleaning solvents, you only use water,, d. Try to always use water ora highly diluted solvent if cleaning, solvents cause you physical irritations such as watery eyes,, Ans. (d) Try to always use water or a highly diluted solvent i, , cleaning solvents cause you physical irritations such as |, watery eyes, , 1g is an example of an antivirus software?, Security, , is available for free?, , 9 antiviruses is made by a Chinese, , b. Microsoft Security Essentials, d. None of these, , ponents or peripherals of a, you use to clean dirt, dust, or, the outside case and on the, , , , , , lowing viruses infects the boot records on, , , , 1g any type of cleaning i, , puters as they |, , i Qi9., , i i ll, ee, , j, , Information Technology | ¢ 45, O04. What should YOU HOt use inside of your connputer that can, , cause damage to the internal Components of your computer, due to the build-up of static electricity, , fern, , , , , , , yt, inside the corny, b, Do not us im ”, computer, ©. Do nat use a vacuurn cleaner for the inside of Your e, d, All of the, , , , , Ans, (c) 00 not, , , , computer, , Q15. Some components in your computer may only be able to, be cleaned using 4 product des, component; if this is the ca:, a. A toothbrush to clear, , around the fan,, , igned for cleaning that, , which tip Is most useful?, , , , , , b, Awater spray bottle that can be, , , , , © Aportable vacuum can be u, cigarette partic, , 4. A dry paper t, Ans. (c) A portable, , hair, cigarette particles, and oth, Q16. A cloth is the best tool to use when rubbing down a, , component; although paper towels can be used with most, , hardware, which hardware component can be cleaned with a, cloth?, , 4, You use a cloth when cle,, , , , and athe, , , , ACUI can be, , aning, Componen, outside of the case, a drive, mouse, ke, b, Monitor screen, , , , yboard, , Inside the case of a computer, d, All of the above, Ans. (a) You use a cloth when cle, outside of the case, a drive, ' Q17. Why should you clean a, drive?, a. Because it is important to keep the surface, b, Disks can collect dust and dec, ©. Can cause read errors with CD, d. All of the above, Ans. (c) Can cause read errors with CD dises, , ; Q18. How do you clean your hard drive?, , ' a. The hard drive automatically cleans, need to be cleaned,, , b. The hard drive is write Protected and cannot be accessed, using software utilities,, , ©The hard drive should be cleaned regularly using the, , various software utilities installed in your operating system, , to maintain the system by keeping it running fast and more, effectively,, , d, All of the above, Ans. (c) The hard drive should be cleaned regularly using the, various software utilities installed in your Operating system, to maintain the system by keeping it running fast and more, effectively,, The computer keyboard is often the most germ infected item, in your home or office, often it will contain more bacteria than, your toilet seat. Cleaning it can help remove any dangerous, bacteria, dirt, dust and hair can also build up causing the, keyboard to not function properly, What is the procedure for, cleaning a keyboard?, , aning, Components, , , , such as the, mouse, keyboard, , dirty CD-ROM drive or other disc, , shiny, ‘oy the disk drive, discs, , , , 5 itself and does not
Page 4 :
4G | MASTERMIND CHAPTERWISE QluEsTION BANK, scuum cleaner, keyboard by turning it upside down and, , , , , , effective method is to use compressed air., is pressurized air contained in a can with, , , , a very long ni, and blow away all of the dust and debris that has gathered, there., ¢. All of the above, ‘Ans. () A more effective method is to use compressed air., Compressed air is pressurized air contained in a can with a, , , , , blow away all of the dust and debris that has gathered there, 20. A dirty LCD monitor can be caused by dust and finger prints, , should you remember to not do?, , dust cloth., , the LCD to become scratched., All of the above, , the LCD to become scratched., be careful?, the computer to blow up., , generates electricity., , ‘ i or destroy his or her computer or hardware components., ; d.Allof the above, i Ans. (c) ESD is one of the few things an individual can do to damage, , or destroy his or her computer or hardware components., Q22. Which of the following are objectives of Malware?, , a. Provide remote control for an attacker to use an infected :, , machine., b. Investigate the infected user's local network., € Steal sensitive data., d. All of the above, Ans. (d) All of the above, , Though varied in type and capabilities, malware usually has, , , , an attacker to use an infected machine, Send spam from the, , infected machine to unsuspecting targets, Investigate the, infected user's local network and Steal sensitive data., , zie. Simply aim the air between the keys |, , very long nozzle. Simply aim the air between the keys and, , that can make the screen difficult to read. The monitor screen |, is not made of glass, so therefore special cleaning procedures :, need to be followed. When cleaning the LCD monitor, what |, , = When cleaning the LCD screen just wipe it with a damp cloth |, by rubbing the dirt marks off the screen as hard as you can. |, , b. When cleaning the LCD screen you can use water and }, detergent to soap the surface and then polish it with a fine, , ¢ When cleaning the LCD screen it is important to remember, , to not spray any liquids onto the LCD directly, press gently :, while cleaning. and do not use a paper towel as it may cause }, , Ans. (c)When cleaning the LCD screen itis important to remember |, to not spray any liquids onto the LCD directly, press gently !, while cleaning, and do not use a paper towel as it may cause ;, , Q21 Whatis an electric static discharge (ESD) and why should you }, a. ESD is a short circuit caused by electricity. This can cause !, , b. ESD is the electrical component of the motherboard that :, , c ESDis one of the few things an individual can do to damage }, , , , one of the following objectives: Provide remote control for |, , Q.23. Malware is short form of:, a, malicious hardware, b. malicious software, c. Both a. and b., d, None of the above, ‘Ans, (b) malicious software, 24. Which of the following is a programs that copy themselves, throughout a computer or network?, a. Worms b, Trojans, c. Viruses d. Rootkits, Ans. (c) Viruses, Viruses: Programs that copy themselves throughout a, computer or network., ! Q25. Which is true about Worms?, i a, Self-replicating viruses that exploit security vulnerabilities, to automatically spread themselves across computers and, networks., : b. Worms on existing programs and can only be activated, whena user opens the program., c. Worms vary and hide themselves in the operating system,, d, All of the above, (a) Setf-replicating viruses that exploit security vulnerabilities, to automatically spread themselves across computers and, networks., Worms: Self-replicating viruses that exploit security, vulnerabilities to automatically spread themselves across, computers and networks., | Q26. Which of the following malware do not replicate or reproduce, through infection?, a, Worms,, c. Viruses, Ans. (b) Trojans, , Trojans do not replicate or reproduce through infection., : “Trojan” alludes to the mythological story of Greek soldiers, ‘ hidden inside a wooden horse that was given to the enemy, , , , Ans., , b, Trojans, d. Rootkits, , city of Troy., , : Q 27. RATs stands for:, , a. Rootkits Administration Tools, , : b, Remote Access Tools, , i ¢ Remote Administration Tools, , : d, Remote Attack Tools, , Ans. (c) Remote Administration Tools, Remote Administration Tools (RATS): Software that allows a, remote operator to control a system., , ; Q28. Which malware has Short for “robot network”?, , a. Ronets b. Botnets, c. Botwork d. Rowork, , Ans. (b) Botnets, , , , Botnets are highly versatile and adaptable, able to maintain, , resilience through redund, ant server ing i q, computers to relay traffic, oa, , Q29. Which malware enable adi, , , , i attacker ta: ministrative control, allowing an, : Sianenae do almost eee on an infected computer?, , ‘ . RATS, , ; cB, , . Ans. ees d. Worms, , : - (b) RATS., , : RATS enable admini i, , i do almost anyth inistrative control, allowing an attacker to, , INB ON an infected computer.
Page 5 :
OE ————, , Q30. Which malware are often the armies behind today’s, distributed denial-of-service (DDoS) attacks?, a, Botnets, . Trojans, , Ans. (a) Botnets, , Botnets are often the armies behind today’s, denial-of-service (DDoS) attacks,, , Q31. What is true regarding Trojans?, a. Trojans will conduct whatever action they have been, , programmed to carry out., , b, Botnets Spyware, d, Viruses, , distributed, , b, “Trojan” alludes to the mythological story of Greek soldiers |, , hidden inside a wooden horse that was given to the enemy, city of Troy., , ©, Trojans do not replicate or reproduce through infection., d, All of the above, , Ans. (d) All of the above, , Q.32. Which of the following is designed to perform legitimate |, , tasks but it also performs unknown and unwanted activity?, a. Viruses b. Worms, . Trojan horses d. Semantic attack, , Ans, (c) Trojan horses, , A Trojan horse is designed to perform legitimate tasks but it, , also performs unknown and unwanted activity., , Q33. Aworm does not need another file or program to copy itself; |, , it is a self-sustaining running program., , a, True b, False, ¢, Can be true or false d, Cannot say, Ans, (a) True, , _ True, A worm does not need another file or program to copy ‘, itself; it is a self-sustaining running program. i, Q.34, What are the types of malware? Hi, , , , , , a, Caterpillars b. Worms :, ¢, Lions. d. Horses, , Worms i, , c | of the following is not a stand-alone program? ;, , ) b. Worm ‘, , d. Spyware ', , (9 Virus, Q36. What is Trojan horse?, a. A Trojan horse program has the appearance of having a, useful and desired function., b. A Trojan horse neither replicates nor copies itself, but causes ;, damage or compromises the security of the computer. f, CA Trojan horse must be sent by someone or carried by i, another program and may arrive in the form of a joke, program or software of some sort,, d, All of the above, Ans. (d) All of the above, Q37. Which of the following is a program capable of continually, replicating with little or no user intervention? |, a. Virus b, Trojan horses, c. Rootkit d, Worms., Ans. (a) Virus, Q 38. What are the examples of Malware Spreads?, a. Social network b, Pirated software, c, Removable media d, All of these, Ans, (d) All of these, , , , i ell, , Information Technology | Class 10 | Tern-1 | 47, , 0.39. Which malicious program cannot do anything until actions, are taken to activate the file attached by the malware?, 5. Vie, , a, Trojan Horse, , , , , ©. Virus, Ans. (¢) Virus, 0.40. The attack that focuses on capturing small packets from the, network transmitted by other computers and eae the, data content in search of any type of information is... S, a. phishing, , , , ©. saris, Ans, (b) eavesdropping, Q41. What is an antivirus?, , a. A bigger and rnore dangerous, , , , b, Software used to duplicate vir, , , , c. Computer software, , malicious software, , , , d, A biological agent that reproduc, living things, , , , Ans. (c) Computer software us, malicious software, Q42. What is Spyware?, a. Spyware is a type of rnalware i, collects inforrnation about u, , , , , , , , b, The presence of spyware is typical, and can be difficult to detect., , c. Spyware programs lurk on, important information,, other personal identification infor, Off to sorneone else., , d, All of the above, , Ans. (d) All of the above, , | Q43. What are the uses of Malware?, , , , a. Many early infectious programs. including, Worm, were written as experiments or pra, , he first Inte, , , , , b, Today, malware is used primarily to steal sensitive p, financial, or business information for the benefit of oth, c, Malware is sometimes used broadly against gove, or corporate websites to gather guarded information, disrupt their operation in general, d, All of the above, Ans. (d) All of the above, , Assertion-Reason Type Questions, v, , In the questions given below, there are two statements, , marked as Assertion (A) and Reason (R). Read the statements, , and choose the correct option., , a. Both (A) and (R) are true, and (R) is the correct explanation, of (A),, , b, Both (A) and (R) are true, but (R) is not correct explanation, of (A),, , c. (A) is true, but (R) is false., , d, (A) is false, but (R) is true., , Assertion (A): A large number of files are stored in the, , computer. These files can be disorganised and fragmented, , and may result in slowing down of the system., , Reason (R): The CPU gets heated while working so there is a, , , , , , , Q 44.