SlideShare a Scribd company logo
Computer Security
1. What is a Virus?
Ans:Virus is a computer program that can
copy itself and infect a computer without
permission or knowledge of the user.
2. What are the different types of Virus?
Ans: There are 5 types of Virus
1.Macro Virus
2.Boot sector Virus
3.Network virus
4.Logic Bomb virus
5.Worm virus
3. What is an antivirus ?
Ans: Antivirus is a security program , that
is installed on computer to protect it from
getting viruses.
4. Mention few antivirus softwares.
Ans: K7, Kaspersky, Quickheal,Avast
Norton etc.,
5. What is Firewall?
Ans: Firewalls are computer systems that
protect computer when connected to
network.
6.What are Hackers and crackers?
Ans: Hackers are the persons who breaks
into other computer and changes the data
wantedly .Crackers are the persons who
breaks into others computer and do not
change the data wantedly.
7.What is Freeware?
Ans: Freeware is programming that is offered
at no cost and is a common class of small
applications available for downloading and use
in most operating systems
8. What is an operating system?
Ans: Operating system acts an interface
between the user and the computer
9. Give some examples of operating system.
Ans: Windows XP, Windows 7, windows 8,
windows 10 pro , Linux, Unix etc.,
10. Spellings
a) Operating System
b) Downloading
c) Firewall
d) Hackers
e) Crackers
f) Freeware
g) Antivirus

More Related Content

What's hot

Computer virus
Computer virusComputer virus
Computer virus
Kaushik Vemani Venkata
 
Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final ppt
aritradutta22
 
Virus and Anti Virus - Types of Virus and Anti Virus
Virus and Anti Virus - Types of Virus and Anti VirusVirus and Anti Virus - Types of Virus and Anti Virus
Virus and Anti Virus - Types of Virus and Anti Virus
Adeel Rasheed
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
Alfred George
 
Computer virus
Computer virusComputer virus
Computer virus
Utchi
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
Rajah Anuragavan
 
Computer virus
Computer virusComputer virus
Computer virus
Shubham Kafle
 
Presentation on Computer Viruses
Presentation on Computer Viruses Presentation on Computer Viruses
Presentation on Computer Viruses
Mohak Jain
 
Presentation2
Presentation2Presentation2
Presentation2Jeslynn
 
What is a virus and anti virus
What is a virus and anti virusWhat is a virus and anti virus
What is a virus and anti virus
Leonor Costa
 
Cyber security
Cyber securityCyber security
Cyber security
Rishav Sadhu
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
Vivek Agarwal
 
Computer worms viruses and Prevention
Computer worms viruses and PreventionComputer worms viruses and Prevention
Computer worms viruses and Prevention
Pratimesh Pathak
 
Computer virus
Computer virusComputer virus
Computer virus
Ankita Shirke
 
Virus project
Virus projectVirus project
Virus project
Shehrevar Davierwala
 
Presentation on virus
Presentation on virusPresentation on virus
Presentation on virus
Protik Roy
 

What's hot (20)

Computer virus
Computer virusComputer virus
Computer virus
 
Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final ppt
 
Virus and Anti Virus - Types of Virus and Anti Virus
Virus and Anti Virus - Types of Virus and Anti VirusVirus and Anti Virus - Types of Virus and Anti Virus
Virus and Anti Virus - Types of Virus and Anti Virus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer virus
Computer virusComputer virus
Computer virus
 
Presentation on computer viruses
Presentation on computer virusesPresentation on computer viruses
Presentation on computer viruses
 
Antivirus PPt
Antivirus PPtAntivirus PPt
Antivirus PPt
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Presentation on Computer Viruses
Presentation on Computer Viruses Presentation on Computer Viruses
Presentation on Computer Viruses
 
COMPUTER VIRUS
COMPUTER VIRUSCOMPUTER VIRUS
COMPUTER VIRUS
 
Presentation2
Presentation2Presentation2
Presentation2
 
What is a virus and anti virus
What is a virus and anti virusWhat is a virus and anti virus
What is a virus and anti virus
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Computer worms viruses and Prevention
Computer worms viruses and PreventionComputer worms viruses and Prevention
Computer worms viruses and Prevention
 
Computer virus
Computer virusComputer virus
Computer virus
 
Virus project
Virus projectVirus project
Virus project
 
Presentation on virus
Presentation on virusPresentation on virus
Presentation on virus
 

Similar to CLASS VII COMPUTER SECURITY

CLASS IX COMPUTER APPLICATIONS
CLASS IX COMPUTER APPLICATIONSCLASS IX COMPUTER APPLICATIONS
CLASS IX COMPUTER APPLICATIONS
Rc Os
 
Virus and antivirus
Virus and antivirusVirus and antivirus
Virus and antivirus
Muhammad Abdurrabb
 
Web virus activity
Web virus activityWeb virus activity
Web virus activitySim_Dhillon
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
jangezkhan
 
Computer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon ChakrabortyComputer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon Chakrabortysankhadeep
 
Virus and antivirus
Virus and antivirus Virus and antivirus
Virus and antivirus
zain Ul abadin
 
Virus
VirusVirus
Virus
Protik Roy
 
Analysis of virus algorithms
Analysis of virus algorithmsAnalysis of virus algorithms
Analysis of virus algorithmsUltraUploader
 
Firewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesFirewall , Viruses and Antiviruses
Firewall , Viruses and Antiviruses
Vikas Chandwani
 
Network virus detection & prevention
Network virus detection & preventionNetwork virus detection & prevention
Network virus detection & prevention
Khaleel Assadi
 
Dilsher idrees mustafa_6_a_vulnerabilities_study
Dilsher idrees mustafa_6_a_vulnerabilities_studyDilsher idrees mustafa_6_a_vulnerabilities_study
Dilsher idrees mustafa_6_a_vulnerabilities_study
dilsherece
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
PriSim
 
Cscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antivirusesCscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antiviruses
Alireza Ghahrood
 
Computer virus
Computer virusComputer virus
Computer virus
Shailendra Gohil
 
Ch19
Ch19Ch19
Antivirus security
Antivirus securityAntivirus security
Antivirus security
mPower Technology
 
Virus
VirusVirus
Virus
dddaou
 
Computer viruses and anti viruses
Computer viruses and anti virusesComputer viruses and anti viruses
Computer viruses and anti viruses
Mohit Jaiswal
 
CSC1100 - Chapter09 - Computer Security, Ethics and Privacy
CSC1100 - Chapter09 - Computer Security, Ethics and PrivacyCSC1100 - Chapter09 - Computer Security, Ethics and Privacy
CSC1100 - Chapter09 - Computer Security, Ethics and Privacy
Yhal Htet Aung
 

Similar to CLASS VII COMPUTER SECURITY (20)

CLASS IX COMPUTER APPLICATIONS
CLASS IX COMPUTER APPLICATIONSCLASS IX COMPUTER APPLICATIONS
CLASS IX COMPUTER APPLICATIONS
 
Virus and antivirus
Virus and antivirusVirus and antivirus
Virus and antivirus
 
Web virus activity
Web virus activityWeb virus activity
Web virus activity
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Computer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon ChakrabortyComputer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon Chakraborty
 
Virus and antivirus
Virus and antivirus Virus and antivirus
Virus and antivirus
 
Virus
VirusVirus
Virus
 
Analysis of virus algorithms
Analysis of virus algorithmsAnalysis of virus algorithms
Analysis of virus algorithms
 
Firewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesFirewall , Viruses and Antiviruses
Firewall , Viruses and Antiviruses
 
Network virus detection & prevention
Network virus detection & preventionNetwork virus detection & prevention
Network virus detection & prevention
 
Dilsher idrees mustafa_6_a_vulnerabilities_study
Dilsher idrees mustafa_6_a_vulnerabilities_studyDilsher idrees mustafa_6_a_vulnerabilities_study
Dilsher idrees mustafa_6_a_vulnerabilities_study
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 
Cscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antivirusesCscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antiviruses
 
Computer virus
Computer virusComputer virus
Computer virus
 
Ch19
Ch19Ch19
Ch19
 
Antivirus security
Antivirus securityAntivirus security
Antivirus security
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Virus
VirusVirus
Virus
 
Computer viruses and anti viruses
Computer viruses and anti virusesComputer viruses and anti viruses
Computer viruses and anti viruses
 
CSC1100 - Chapter09 - Computer Security, Ethics and Privacy
CSC1100 - Chapter09 - Computer Security, Ethics and PrivacyCSC1100 - Chapter09 - Computer Security, Ethics and Privacy
CSC1100 - Chapter09 - Computer Security, Ethics and Privacy
 

More from Rc Os

Dove
DoveDove
Dove
Rc Os
 
CLASS IV ENGLISH
CLASS IV ENGLISHCLASS IV ENGLISH
CLASS IV ENGLISH
Rc Os
 
CLASS 4 MATHS
CLASS 4 MATHSCLASS 4 MATHS
CLASS 4 MATHS
Rc Os
 
CLASS 4 MATHS
CLASS 4 MATHSCLASS 4 MATHS
CLASS 4 MATHS
Rc Os
 
CLASS III MATHS
CLASS III MATHS CLASS III MATHS
CLASS III MATHS
Rc Os
 
CLASS III MATHS
CLASS III MATHSCLASS III MATHS
CLASS III MATHS
Rc Os
 
Changing times.
Changing times.Changing times.
Changing times.
Rc Os
 
3 class english
3 class english3 class english
3 class english
Rc Os
 
Clss ii english-the mouse---
Clss ii  english-the mouse---Clss ii  english-the mouse---
Clss ii english-the mouse---
Rc Os
 
Rainbow
RainbowRainbow
Rainbow
Rc Os
 
NUMBERS 1 TO 20
NUMBERS 1 TO 20NUMBERS 1 TO 20
NUMBERS 1 TO 20
Rc Os
 
TIME
TIMETIME
TIME
Rc Os
 
MEASUREMENTS
MEASUREMENTSMEASUREMENTS
MEASUREMENTS
Rc Os
 
DATA HANDLING
DATA HANDLINGDATA HANDLING
DATA HANDLING
Rc Os
 
patterns
 patterns patterns
patterns
Rc Os
 
Who is heavier
Who is heavierWho is heavier
Who is heavier
Rc Os
 
Sundari
SundariSundari
Sundari
Rc Os
 
The tiger and the mosquitoe
The tiger and the mosquitoeThe tiger and the mosquitoe
The tiger and the mosquitoe
Rc Os
 
Photoshop
PhotoshopPhotoshop
Photoshop
Rc Os
 
COMPUTERS Database
COMPUTERS Database COMPUTERS Database
COMPUTERS Database
Rc Os
 

More from Rc Os (20)

Dove
DoveDove
Dove
 
CLASS IV ENGLISH
CLASS IV ENGLISHCLASS IV ENGLISH
CLASS IV ENGLISH
 
CLASS 4 MATHS
CLASS 4 MATHSCLASS 4 MATHS
CLASS 4 MATHS
 
CLASS 4 MATHS
CLASS 4 MATHSCLASS 4 MATHS
CLASS 4 MATHS
 
CLASS III MATHS
CLASS III MATHS CLASS III MATHS
CLASS III MATHS
 
CLASS III MATHS
CLASS III MATHSCLASS III MATHS
CLASS III MATHS
 
Changing times.
Changing times.Changing times.
Changing times.
 
3 class english
3 class english3 class english
3 class english
 
Clss ii english-the mouse---
Clss ii  english-the mouse---Clss ii  english-the mouse---
Clss ii english-the mouse---
 
Rainbow
RainbowRainbow
Rainbow
 
NUMBERS 1 TO 20
NUMBERS 1 TO 20NUMBERS 1 TO 20
NUMBERS 1 TO 20
 
TIME
TIMETIME
TIME
 
MEASUREMENTS
MEASUREMENTSMEASUREMENTS
MEASUREMENTS
 
DATA HANDLING
DATA HANDLINGDATA HANDLING
DATA HANDLING
 
patterns
 patterns patterns
patterns
 
Who is heavier
Who is heavierWho is heavier
Who is heavier
 
Sundari
SundariSundari
Sundari
 
The tiger and the mosquitoe
The tiger and the mosquitoeThe tiger and the mosquitoe
The tiger and the mosquitoe
 
Photoshop
PhotoshopPhotoshop
Photoshop
 
COMPUTERS Database
COMPUTERS Database COMPUTERS Database
COMPUTERS Database
 

Recently uploaded

CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
BhavyaRajput3
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
Anna Sz.
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
timhan337
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 

Recently uploaded (20)

CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 

CLASS VII COMPUTER SECURITY

  • 1. Computer Security 1. What is a Virus? Ans:Virus is a computer program that can copy itself and infect a computer without permission or knowledge of the user. 2. What are the different types of Virus? Ans: There are 5 types of Virus 1.Macro Virus 2.Boot sector Virus 3.Network virus 4.Logic Bomb virus 5.Worm virus 3. What is an antivirus ? Ans: Antivirus is a security program , that is installed on computer to protect it from getting viruses. 4. Mention few antivirus softwares. Ans: K7, Kaspersky, Quickheal,Avast Norton etc., 5. What is Firewall? Ans: Firewalls are computer systems that protect computer when connected to network. 6.What are Hackers and crackers?
  • 2. Ans: Hackers are the persons who breaks into other computer and changes the data wantedly .Crackers are the persons who breaks into others computer and do not change the data wantedly. 7.What is Freeware? Ans: Freeware is programming that is offered at no cost and is a common class of small applications available for downloading and use in most operating systems 8. What is an operating system? Ans: Operating system acts an interface between the user and the computer 9. Give some examples of operating system. Ans: Windows XP, Windows 7, windows 8, windows 10 pro , Linux, Unix etc., 10. Spellings a) Operating System b) Downloading c) Firewall
  • 3. d) Hackers e) Crackers f) Freeware g) Antivirus