CBSE NCERT Class IX (9th) | Computer Science
NCERT Solutions for Class 9th: Ch 6 Secruity threats and Safety Measures
► (d) All of these
► (a) Hackers
► (b) False
► (c) Spyware
► (a) Man made
►(d) None of the above
► (a) Spam
|(3)||Trojan Horse||(c)||I Love You|
|(4)||Spyware||(d)||Cool Web Search|
|(5)||Spam||(e)||“Get Rich Quick” Scheme|
The computer gets infected from Spyware. It monitors user activity on the Internet and transmits that
information in the background to someone else. Spyware can also gather information about e-mail addresses and even passwords and credit card numbers. It also sends information back to the spy ware’s home base via the user’s Internet connection, thus it eats user’s internet bandwidth.
We can make our important data safe on computer through below steps:
1. Using Security software such as Norton antivirus, Symantec etc.
2. Beware of email attachments form unknown sources
3. Do not randomly download material from websites which has not been checked for security.
3. Never propagate hoax or chain emails.
4. Frequently back up important data and files.
5. Use encryption or sites that use encrypted data.
Virus- A computer virus is a program usually hidden within another simple program. It produces copies of itself and inserts them into other programs or files, in turn destroying the data and performing other malicious actions. Computer viruses are never naturally occurring; they are always man-made.
Worms- Worms are very similar to viruses in the manner that they are computer programs that
replicate copies of themselves (usually to other computer systems via network connections). Unlike viruses, worms exist as separate entities; they do not attach themselves to other files or programs.
Torjan Horses- A Trojan horse is a program that claims to rid your computer of viruses but instead
introduces viruses into the system. The Trojan program does not attach itself to the files like a virus nor replicate itself like a worm but it does provide unauthorized access to user’s computer. They are mostly spread through internet downloads and online gaming programs. They mostly affect the targeted computers.
Hackers were the gifted programmers who gain access to the systems or network to show case the security loopholes to the administrators.
Cracker was activist who had intentions of doing malicious activities. Crackers have an end goal of destroying data and network for personal monetary gains.
<< Back to NCERT/CBSE Notes