SlideShare a Scribd company logo
1 of 4
CYBER – SAFETY
1.What is an operating system?
Ans: Operating system acts an interface
between the user and the computer
2.. Give some examples of operating
system.
Ans: Windows XP, Windows 7, windows 8,
windows 10 pro , Linux, Unix etc.,
3.What is a Virus?
Ans:Virus is a computer program that can
copy itself and infect a computer without
permission or knowledge of the user.
4.What are the different types of Virus?
Ans: There are 5 types of Virus
1.Macro Virus
2.Boot sector Virus
3.Network virus
4.Logic Bomb virus
5.Worm virus
5.What is an antivirus ? Ans: Antivirus is a
security program , that is installed on
computer to protect it from getting
viruses.
6.Mention few antivirus softwares.
Ans: K7, Kaspersky, Quickheal,Avast,
Norton etc.,
7.What is Firewall?
Ans: Firewalls are computer systems that
protect computer when connected to
network.
8.What are Hackers and crackers?
Ans: Hackers are the persons who breaks
into other computer and changes the data
wantedly .Crackers are the persons who
breaks into others computer and do not
change the data wantedly.
9.What is Freeware?
Ans: Freeware is programming that is offered
at no cost and is a common class of small
applications available for downloading and use
in most operating systems
10.What is phishing?
Ans: Sending a fake email or text to elicit a
response and gain confidential details
11. What is trolling?
Ans: Harassing groups online in an
inflammatory way for ‘fun’ and to seek
attention
12. What is Cyberstalking
Ans: Cyberstalking is the use of the
Internet or other electronic means to stalk
or harass an individual, a group of
individuals, or an organization
13. What is Cyberbullying
Ans:Cyberbullying is the attack upon an
individual or group through the use of
electronic means such as instant messaging,
social media, e-mail and other forms of
online communication with the intent
14. What is Internet scams
Ans: Internet scams often aim to cheat the
victim of personal property directly rather
than personal information through false
promises, confidence tricks and more.

More Related Content

What's hot

Network security threats and solutions
Network security threats and solutionsNetwork security threats and solutions
Network security threats and solutionshassanmughal4u
 
Network Security
Network SecurityNetwork Security
Network Securityforpalmigho
 
Web Security
Web SecurityWeb Security
Web SecurityTripad M
 
Network security presentation
Network security presentationNetwork security presentation
Network security presentationKudzai Rerayi
 
Internet security issues
Internet security issuesInternet security issues
Internet security issuesirfan shaikh
 
Cyber crime and security threads
Cyber crime and security threadsCyber crime and security threads
Cyber crime and security threadsVdidv
 
Network management and security
Network management and securityNetwork management and security
Network management and securityAnkit Bhandari
 
Hacking and virus presentation
Hacking and virus presentationHacking and virus presentation
Hacking and virus presentationPhương Anh Pađi
 
Cyber security by Anushka Jha
Cyber security by Anushka JhaCyber security by Anushka Jha
Cyber security by Anushka JhaAnushka Jha
 
Digital Security Slide Show
Digital Security Slide ShowDigital Security Slide Show
Digital Security Slide Showzed_o07
 
Network Security
Network SecurityNetwork Security
Network SecurityMAJU
 
Cyber security by Gaurav Singh
Cyber security by Gaurav SinghCyber security by Gaurav Singh
Cyber security by Gaurav SinghGaurav Singh
 

What's hot (20)

Network security threats and solutions
Network security threats and solutionsNetwork security threats and solutions
Network security threats and solutions
 
Network Security
Network SecurityNetwork Security
Network Security
 
Computer and network security
Computer and network securityComputer and network security
Computer and network security
 
Windows network security
Windows network securityWindows network security
Windows network security
 
Network security
Network securityNetwork security
Network security
 
Web Security
Web SecurityWeb Security
Web Security
 
Network security presentation
Network security presentationNetwork security presentation
Network security presentation
 
Internet security issues
Internet security issuesInternet security issues
Internet security issues
 
Cyber crime and security threads
Cyber crime and security threadsCyber crime and security threads
Cyber crime and security threads
 
Network management and security
Network management and securityNetwork management and security
Network management and security
 
Hacking and virus presentation
Hacking and virus presentationHacking and virus presentation
Hacking and virus presentation
 
Adware
AdwareAdware
Adware
 
Cyber security by Anushka Jha
Cyber security by Anushka JhaCyber security by Anushka Jha
Cyber security by Anushka Jha
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Digital Security Slide Show
Digital Security Slide ShowDigital Security Slide Show
Digital Security Slide Show
 
Network Security
Network SecurityNetwork Security
Network Security
 
Cyber security by Gaurav Singh
Cyber security by Gaurav SinghCyber security by Gaurav Singh
Cyber security by Gaurav Singh
 
iNTERNET THREATS
iNTERNET THREATSiNTERNET THREATS
iNTERNET THREATS
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 

Similar to CLASS IX COMPUTER APPLICATIONS

CSC1100 - Chapter09 - Computer Security, Ethics and Privacy
CSC1100 - Chapter09 - Computer Security, Ethics and PrivacyCSC1100 - Chapter09 - Computer Security, Ethics and Privacy
CSC1100 - Chapter09 - Computer Security, Ethics and PrivacyYhal Htet Aung
 
INFORMATION AND COMPUTER SECURITY.pptx
INFORMATION AND COMPUTER SECURITY.pptxINFORMATION AND COMPUTER SECURITY.pptx
INFORMATION AND COMPUTER SECURITY.pptxToleraYadessaGonfa
 
a documentation of final year SRS for AI drons.ppt
a documentation of final year SRS for AI drons.ppta documentation of final year SRS for AI drons.ppt
a documentation of final year SRS for AI drons.pptNebiyuTeferaShite
 
Computer virus
Computer virusComputer virus
Computer virusarif srk
 
Computer security
Computer securityComputer security
Computer securityDhani Ahmad
 
Detecting and mitigating cyber threats and attacks1
Detecting and mitigating cyber threats and attacks1Detecting and mitigating cyber threats and attacks1
Detecting and mitigating cyber threats and attacks1NihanthReddyBalaiahg
 
Type of Security Threats and its Prevention
Type of Security Threats and its PreventionType of Security Threats and its Prevention
Type of Security Threats and its Preventionijsrd.com
 
KNOW THE ENEMY
KNOW THE ENEMYKNOW THE ENEMY
KNOW THE ENEMYpcsmalvern
 
Cyber Malware Programs And The Internet
Cyber Malware Programs And The InternetCyber Malware Programs And The Internet
Cyber Malware Programs And The InternetHeidi Maestas
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptAnoop Mishra
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptfaadu1
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptHArshMangasuli
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptmohan jena
 
Cyber-Security-.ppt
Cyber-Security-.pptCyber-Security-.ppt
Cyber-Security-.pptmabiratu
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptssuser77bda9
 
Cyber-Security-20211013105857 (1).ppt
Cyber-Security-20211013105857 (1).pptCyber-Security-20211013105857 (1).ppt
Cyber-Security-20211013105857 (1).pptKeerthikaaThiyagaraj
 

Similar to CLASS IX COMPUTER APPLICATIONS (20)

CSC1100 - Chapter09 - Computer Security, Ethics and Privacy
CSC1100 - Chapter09 - Computer Security, Ethics and PrivacyCSC1100 - Chapter09 - Computer Security, Ethics and Privacy
CSC1100 - Chapter09 - Computer Security, Ethics and Privacy
 
INFORMATION AND COMPUTER SECURITY.pptx
INFORMATION AND COMPUTER SECURITY.pptxINFORMATION AND COMPUTER SECURITY.pptx
INFORMATION AND COMPUTER SECURITY.pptx
 
a documentation of final year SRS for AI drons.ppt
a documentation of final year SRS for AI drons.ppta documentation of final year SRS for AI drons.ppt
a documentation of final year SRS for AI drons.ppt
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer security
Computer securityComputer security
Computer security
 
Detecting and mitigating cyber threats and attacks1
Detecting and mitigating cyber threats and attacks1Detecting and mitigating cyber threats and attacks1
Detecting and mitigating cyber threats and attacks1
 
Type of Security Threats and its Prevention
Type of Security Threats and its PreventionType of Security Threats and its Prevention
Type of Security Threats and its Prevention
 
KNOW THE ENEMY
KNOW THE ENEMYKNOW THE ENEMY
KNOW THE ENEMY
 
Cyber Malware Programs And The Internet
Cyber Malware Programs And The InternetCyber Malware Programs And The Internet
Cyber Malware Programs And The Internet
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
 
cs0123.ppt
cs0123.pptcs0123.ppt
cs0123.ppt
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
 
Cyber-Security-.ppt
Cyber-Security-.pptCyber-Security-.ppt
Cyber-Security-.ppt
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
 
Cyber-Security.ppt
Cyber-Security.pptCyber-Security.ppt
Cyber-Security.ppt
 
Cyber-Security-20211013105857 (1).ppt
Cyber-Security-20211013105857 (1).pptCyber-Security-20211013105857 (1).ppt
Cyber-Security-20211013105857 (1).ppt
 

More from Rc Os

Dove
DoveDove
DoveRc Os
 
CLASS IV ENGLISH
CLASS IV ENGLISHCLASS IV ENGLISH
CLASS IV ENGLISHRc Os
 
CLASS 4 MATHS
CLASS 4 MATHSCLASS 4 MATHS
CLASS 4 MATHSRc Os
 
CLASS 4 MATHS
CLASS 4 MATHSCLASS 4 MATHS
CLASS 4 MATHSRc Os
 
CLASS III MATHS
CLASS III MATHS CLASS III MATHS
CLASS III MATHS Rc Os
 
CLASS III MATHS
CLASS III MATHSCLASS III MATHS
CLASS III MATHSRc Os
 
Changing times.
Changing times.Changing times.
Changing times.Rc Os
 
3 class english
3 class english3 class english
3 class englishRc Os
 
Clss ii english-the mouse---
Clss ii  english-the mouse---Clss ii  english-the mouse---
Clss ii english-the mouse---Rc Os
 
Rainbow
RainbowRainbow
RainbowRc Os
 
NUMBERS 1 TO 20
NUMBERS 1 TO 20NUMBERS 1 TO 20
NUMBERS 1 TO 20Rc Os
 
TIME
TIMETIME
TIMERc Os
 
MEASUREMENTS
MEASUREMENTSMEASUREMENTS
MEASUREMENTSRc Os
 
DATA HANDLING
DATA HANDLINGDATA HANDLING
DATA HANDLINGRc Os
 
patterns
 patterns patterns
patternsRc Os
 
Who is heavier
Who is heavierWho is heavier
Who is heavierRc Os
 
Sundari
SundariSundari
SundariRc Os
 
The tiger and the mosquitoe
The tiger and the mosquitoeThe tiger and the mosquitoe
The tiger and the mosquitoeRc Os
 
Photoshop
PhotoshopPhotoshop
PhotoshopRc Os
 
COMPUTERS Database
COMPUTERS Database COMPUTERS Database
COMPUTERS Database Rc Os
 

More from Rc Os (20)

Dove
DoveDove
Dove
 
CLASS IV ENGLISH
CLASS IV ENGLISHCLASS IV ENGLISH
CLASS IV ENGLISH
 
CLASS 4 MATHS
CLASS 4 MATHSCLASS 4 MATHS
CLASS 4 MATHS
 
CLASS 4 MATHS
CLASS 4 MATHSCLASS 4 MATHS
CLASS 4 MATHS
 
CLASS III MATHS
CLASS III MATHS CLASS III MATHS
CLASS III MATHS
 
CLASS III MATHS
CLASS III MATHSCLASS III MATHS
CLASS III MATHS
 
Changing times.
Changing times.Changing times.
Changing times.
 
3 class english
3 class english3 class english
3 class english
 
Clss ii english-the mouse---
Clss ii  english-the mouse---Clss ii  english-the mouse---
Clss ii english-the mouse---
 
Rainbow
RainbowRainbow
Rainbow
 
NUMBERS 1 TO 20
NUMBERS 1 TO 20NUMBERS 1 TO 20
NUMBERS 1 TO 20
 
TIME
TIMETIME
TIME
 
MEASUREMENTS
MEASUREMENTSMEASUREMENTS
MEASUREMENTS
 
DATA HANDLING
DATA HANDLINGDATA HANDLING
DATA HANDLING
 
patterns
 patterns patterns
patterns
 
Who is heavier
Who is heavierWho is heavier
Who is heavier
 
Sundari
SundariSundari
Sundari
 
The tiger and the mosquitoe
The tiger and the mosquitoeThe tiger and the mosquitoe
The tiger and the mosquitoe
 
Photoshop
PhotoshopPhotoshop
Photoshop
 
COMPUTERS Database
COMPUTERS Database COMPUTERS Database
COMPUTERS Database
 

Recently uploaded

Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...anjaliyadav012327
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...Pooja Nehwal
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxShobhayan Kirtania
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 

Recently uploaded (20)

Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptx
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 

CLASS IX COMPUTER APPLICATIONS

  • 1. CYBER – SAFETY 1.What is an operating system? Ans: Operating system acts an interface between the user and the computer 2.. Give some examples of operating system. Ans: Windows XP, Windows 7, windows 8, windows 10 pro , Linux, Unix etc., 3.What is a Virus? Ans:Virus is a computer program that can copy itself and infect a computer without permission or knowledge of the user. 4.What are the different types of Virus? Ans: There are 5 types of Virus 1.Macro Virus 2.Boot sector Virus 3.Network virus 4.Logic Bomb virus 5.Worm virus
  • 2. 5.What is an antivirus ? Ans: Antivirus is a security program , that is installed on computer to protect it from getting viruses. 6.Mention few antivirus softwares. Ans: K7, Kaspersky, Quickheal,Avast, Norton etc., 7.What is Firewall? Ans: Firewalls are computer systems that protect computer when connected to network. 8.What are Hackers and crackers? Ans: Hackers are the persons who breaks into other computer and changes the data wantedly .Crackers are the persons who breaks into others computer and do not change the data wantedly. 9.What is Freeware? Ans: Freeware is programming that is offered at no cost and is a common class of small applications available for downloading and use in most operating systems
  • 3. 10.What is phishing? Ans: Sending a fake email or text to elicit a response and gain confidential details 11. What is trolling? Ans: Harassing groups online in an inflammatory way for ‘fun’ and to seek attention 12. What is Cyberstalking Ans: Cyberstalking is the use of the Internet or other electronic means to stalk or harass an individual, a group of individuals, or an organization 13. What is Cyberbullying Ans:Cyberbullying is the attack upon an individual or group through the use of electronic means such as instant messaging, social media, e-mail and other forms of online communication with the intent 14. What is Internet scams
  • 4. Ans: Internet scams often aim to cheat the victim of personal property directly rather than personal information through false promises, confidence tricks and more.