A. Multiple Choice Questions
Ans.
- (b)
- (c)
- (a)
- (a)
- (b)
B. Fill in the blanks
Ans.
- E-mail viruses
- worms
- data
- Cyberbullying
C. Match the following
Ans.
- (b)
- (a)
- (d)
- (c)
D. Very Short Answer Questions
Ans.
- VIRUS stands for Vital Information Resources Under Siege.
- This virus is a malicious program that duplicates itself.
E. Short Answer Questions
Ans.
- The Boot sector is the area of a hard disk that stores valuable information. Boot sector viruses affect this area and cause damages.
- Scanning files and folders helps find and remove viruses, preventing the computer system from getting infected.
- Two safety measures are:
- (i) Install Protective Software like Antivirus
- (ii) Use firewalls to get safe from burglars
- (a) Phishing – This is a fraudulent act of collecting sensitive information of the user, like his/her bank account details, credit card information, net banking passwords by using authentic looking e-mails. These mails generally have bank names to extract money and passwords from people. People suffer heavy financial losses due to phishing.
- To prevent phishing:
- Never open or respond to an unknown e-mail received in your mailbox.
- Never provide any confidential information in reply to the e-mails received from banks.
- Never access a bank’s website from the link provided in an e-mail.
- To prevent phishing:
- (b) Spamming – Spamming refers to the unwanted e-mails sent in bulk to multiple users for promoting products or services. These types of e-mails are sent forcefully to the people who otherwise do not want to receive them. Most of these e-mails are harmless but they exhaust the storage space and make it difficult to identify the important e-mails received.
- To avoid spam e-mails:
- Never provide your e-mail address unnecessarily to any website.
- E-mail servers provide spam filters facility to keep such e-mails in a separate folder.
- Do not reply to the e-mails received in the spam folder.
- To avoid spam e-mails:
- (c) Worms – This virus is a malicious program that duplicates itself. Eventually, this virus fills up the disk space with copies of itself and thereby makes a computer system very slow to work. For example, Blaster and Morris.
- (d) Trojans – These viruses at first appear to be friendly but are very malicious programs. They steal information from the computer. They can be of any type. Even some computer games are Trojan viruses. For example, Bit Frost.
F. Long Answer Questions
Ans.
- Protecting your computer from viruses is not a difficult task. You already know how viruses infect a computer system or how they spread. To protect your computer from viruses, keep the following points in mind:
- Do not use the CD or the pen drive received from another person unless you are certain that the device does not contain a virus.
- Do not download programs or other information from non-reputed sources on Internet.
- Be careful of the attached files you receive in your e-mails. Open only those files sent by the people you trust.
- Install an antivirus program on your computer.
- When directed to another website, do not take any action, leave the website immediately.
- Plagiarism deals with stealing of ideas and thoughts of other people on Internet and projecting them as one’s own work, without the permission of the original author. This is considered a cybercrime and is a punishable act.
- Preventing Plagiarism:
- While using information from the online resources, plagiarism can be avoided by keeping in mind the following points:
- When you use ideas, texts, information from a website, always acknowledge the website from where it is taken.
- Seek written permission of the author whose contents you are using for your work.
- Write the content in your own language. Never use a published text without acknowledging reference.
- You can also put such contents in quotes to avoid plagiarism.
- While using information from the online resources, plagiarism can be avoided by keeping in mind the following points:
- Preventing Plagiarism:
- Digital footprints refer to the impressions or traces left behind by users when they perform online transactions or activities like registering on a website, sending e-mails, e-shopping and uploading or downloading information.
- Digital footprints can be of two types: Passive and Active footprints.
- When we leave the digital footprints unknowingly, like opening a website or sending an e-mail, the IP address of our computer is recorded. This is called passive footprint. When we leave the information intentionally like filling a registration form, it is called active footprint.
- To safeguard yourself from digital footprints:
- Never post inappropriate information on Internet.
- Use the private browsing mode while opening a website so that history is not recorded.
- Always upload appropriate images on Internet.
- Never enter your personal details on unknown websites.
- Digital footprints can be of two types: Passive and Active footprints.

Malik Mohd. Arshad is a Senior English Teacher at STS High School, Aligarh Muslim University, with 21+ years of experience in English Language Teaching (ELT). An M.A. in English and Linguistics, he combines traditional academic values with modern digital learning methods. He is also a certified alumnus of the Texas Intensive English Program (USA).