Viruses can spread through removable media like USB drives, CDs, and hard disks. They can also spread through email attachments and downloads. When an infected file is opened or executed, the virus may become active and try to infect other files and systems. Viruses can cause damage by deleting files, corrupting data, overwriting data, or interfering with normal system operations.
Viruses can spread through removable media like USB drives, CDs, and hard disks. They can also spread through email attachments and downloads. When an infected file is opened or executed, the virus may become active and try to infect other files and systems. Viruses can cause damage by deleting files, corrupting data, overwriting data, or interfering with normal system operations.
Viruses can spread through removable media like USB drives, CDs, and hard disks. They can also spread through email attachments and downloads. When an infected file is opened or executed, the virus may become active and try to infect other files and systems. Viruses can cause damage by deleting files, corrupting data, overwriting data, or interfering with normal system operations.
Viruses can spread through removable media like USB drives, CDs, and hard disks. They can also spread through email attachments and downloads. When an infected file is opened or executed, the virus may become active and try to infect other files and systems. Viruses can cause damage by deleting files, corrupting data, overwriting data, or interfering with normal system operations.
THE LEARNER’s CORNER ACADEMY ,CHINIOT Total-Marks:35
Monthly Test Series (First Year) MARCH 2024 Q. No. 1 Possible answers are given in each statement. Tick correct one. (10) Sr# Question Statement A B C D 1 _________ is not a biometric technique: Palm Print Retina Face Badge 2 Example of virus is : Macfe Norteon Redflag Redlof 3 Program that interferes normal working of computer: Becteria Virus Anti-Virus None 4 A virus that deletes all Microsoft files is: Trojen Horse Boot Sector Logic Bomb All 5 First sector of hard disk is known as______sector. Root First Boot Booting 6 Illegal copy of software is known as _____software. Copy Illegal Pirated None 7 There are ____techniques of enforce security. 1 2 3 4 8 Virus does not affect the __________. Software Hardware Data Programs 9 A hard disk is divide into ________. Tracks Sectors Both A & B None 10 Virus can spread through _________. USB CD Hard Disk All Q. No. 2 Give Short Answers of any Eight(08) of Following: (8x2=16) i. Define computer security? vi. How boot sector virus effect the system? ii. Describe any two techniques of security. vii. Write a short note “Encryption”. iii. What is meant by term “anti-virus”? viii. How virus make damages in computer system ? iv. Define logic Bomb virus. ix. Why security of data is important? v. What are the advantages of using anti-virus. x. What are intentional threats? LONG QUESTION Q.No.3 How virus spread in computer systems/causes of virus? How virus activated in a system? (9)
THE LEARNER’s CORNER ACADEMY ,CHINIOT Total-Marks:35
Monthly Test Series (First Year) MARCH 2024 Subject:Comp. Sci(T4) Q. No. 1 Possible answers are given in each statement. Tick correct one. (10) Sr# Question Statement A B C D 1 _________ is not a biometric technique: Palm Print Retina Face Badge 2 Example of virus is : Macfe Norteon Redflag Redlof 3 Program that interferes normal working of computer: Becteria Virus Anti-Virus None 4 A virus that deletes all Microsoft files is: Trojen Horse Boot Sector Logic Bomb All 5 First sector of hard disk is known as______sector. Root First Boot Booting 6 Illegal copy of software is known as _____software. Copy Illegal Pirated None 7 There are ____techniques of enforce security. 1 2 3 4 8 Virus does not affect the __________. Software Hardware Data Programs 9 A hard disk is divide into ________. Tracks Sectors Both A & B None 10 Virus can spread through _________. USB CD Hard Disk All Q. No. 2 Give Short Answers of any Eight(08) of Following: (8x2=16) i. Define computer security? vi. How boot sector virus effects the system? ii. Describe any two techniques of security. vii. Write a short note “Encryption”. iii. What is meant by term “anti-virus”? viii. How virus make damages in computer system? iv. Define logic Bomb virus. ix. Why security of data is important? v. What are the advantages of using anti-virus. x. What are intentional threats? LONG QUESTION Q.No.3 How virus spread in computer systems/causes of virus? How virus activated in a system? (9)