(X) Ch-3 Computer Security

1. Fill in the blanks. a) education, health and business b) damaged, hacked c) 210 to 240 Celsius d) fire e) UPS and volt-guard f) organism, it is a computer program g) password 2. Tick the best answer a) Hard Disk b) malwares c) Both i and ii d) Theft e) Securing data and information f) data 3. State true or false: a) True b) False c) True d) True e) True 4. Technical terms a) Antivirus b) Backup c) UPS (Uninterruptible Power Supply) d) Password e) Encryption 5. Match the following: a) Backup= Duplicate copy of data b) Password = Allows user to access system c) Scan Disk = Checks and fixes errors of storage devices d) Computer Virus = Software that destroys data 6. Write short notes on: a) Firewall : A firewall consists of software and hardware set up between an internal computer network and the Internet. A computer network manager sets up the rules for the firewall to filter out unwanted disturbances. These rules are set up in such a way that unauthorized access is much more difficult. b) Trojan Horse : A Trojan horse or Trojan, is a malware program that comes as an application. The software initially appears to perform a desirable function for the user prior to installation or execution, but steals information or harms the system. Unlike viruses Trojan horses do not replicate themselves, but they can be just as destructive.