Computer Studies
Answer
Trojan — These computer programs move around the valid programs and get executed with a flashy opening screen. They usually get into the system through e-mail attachments with fascinating names.
Once you open the e-mail, they become active in the background and slowly start deleting/corrupting the files inside the system. They can only spread through user interaction such as opening an e-mail attachment or downloading and running a file from the Internet. For example- Backdoor, Nuker ,etc.
Related Questions
Antivirus software are the utility programs that detect and prevent your computer system from attack of viruses. The main task of an antivirus software is to check all the programs/data files available in the computer. If a virus is detected, the antivirus clears it from the system. A pirated antivirus software should not be used because it will not be able to remove all the viruses, rather it may spread the virus itself. So, you are advised to install original antivirus software and keep it updating periodically. The updated antivirus software also takes care of newly created viruses.
With reference to the above case, answer the following questions:
(a) Which of the following statements is not true about antivirus software?
- It locates infected files.
- It searches for the viruses.
- Once installed, it needs not be updated.
- It removes viruses.
(b) Which of the following is not an antivirus software?
- McAfee
- AVG
- GDATA
- Google Chrome
(c) What is meant by pirated antivirus software?
- Copied from original software
- Reinstalled software
- Loaded from original CD
- None of the above
(d) What will happen if antivirus software is not updated periodically?
- It will be erased after some time.
- It will not be able to trace new viruses.
- It will force operating system to stop functioning.
Define Worm
Define Bomb
Define Program Virus