ICS FA Computer Notes Part 1 Chapter 6 (Security Copyright and Law) Short Questions from Past Papers

ICS FA Computer Notes Part 1 Chapter 6 (Security Copyright and Law) Short Questions from Past Papers 1st Year Notes Online Taleem Ilm Hub

If you want to view other notes of Computer Part 1 Please Click Here.


 Q 1. What is meant by Antivirus?
Ans. An antivirus program protects a computer against viruses by identifying and removing any computer viruses found in memory, on storage media, or on incoming files. Most antivirus programs also protect against worms and Trojan horses. When you purchase a new computer, it often includes antivirus software.

Q 2. What is the purpose of password?
Ans. The purpose of the password is to maintain the security if any system by restricting user. Passwords are used also for authentication, validation, and verification in computer systems.

Q 3. What do you know about copyright act?
Ans. This is a list of copyright Acts, which are laws enacting the copyright. It provides security to creators to misuse their creations.

Q 4. What is boot sector virus?
Ans. Boot sector virus resides in the boot sector of the hard disk and damages the most important files that are needed by the operation system to boot.

Q 5. What is logic bomb?
Ans. They are not considered as viruses because they do not replicate. They are not even programs in their own right but rather camouflaged segments of other programs. Their objective is to destroy data on the computer once certain conditions have been met. Logic bombs go undetected until launched, and the results can be destructive.

 Q 6. What is Trojan horse?
Ans. Trojan horse is a virus program that hides itself with common computer files like zip file. Whenever the infected files are opened the virus activates.

Q 7. What are the causes of virus?
Ans. The major causes of virus are following:
  • Using external media like CD's, DVDs, USB, and Floppy disk.
  • Opening virus infected email.
  • Using infected websites

Q 8. What is data security?
Ans. Data security provides the measures and means to protect personal and organizational data. It is the practice of keeping data protected from corruption and unauthorized access.

Q 9. How virus is activated?
Ans. Virus is activated according to conditions which are written in the virus program. Some viruses automatically activated when they are copied into a system or some wait for an event to be activated.

Q 10. What is Redlof?
Ans. Redlof is a polymorphic virus that embeds itself without any attachment to every e-mail sent from the infected system.

Q 11. Define pirated software?
Ans. The software which is used without giving license or permission by the developer is called pirated software.

Q 12. List different types of viruses?
Ans. Following is the list of viruses. 
  • Boot Virus 
  • Resident Virus 
  • Polymorphic Virus 
  • Overwrite Virus/ Stealth virus 
  • Macro Virus 
  • File Infectors 
  • Companion Viruses 
  • FAT Virus

Written by: Asad Hussain  &  Muhammad Jawad

4 Comments

  1. sir mcqs nd long questions k notes ni mil rahy :(

    ReplyDelete
    Replies
    1. Abhi sirf short question hi hain. short question kay bd mcq or long question start karoon ga.

      Delete
  2. jaldee banoo papers a gaye hain

    ReplyDelete
  3. Plz imp long and short question full book ka bata da plz

    ReplyDelete

Post a Comment

Previous Post Next Post