Q6. What are the common symptoms of a virus attack?
Ans. The following are the common symptoms of a virus attack:
- The computer begins to run slowly.
- Unusual messages and graphics appear on the screen for inexplicable reasons.
- Music not associated with any of the open programs begins to play.
- Some program or data files on the computer either become corrupt or are difficult to locate. Read More …
Q7. Write a note on information security.
Ans. Information security plays an important role in the growth of e-commerce. It can be defined as a set of rules and regulations that users follow online to ensure that the information they provide is not misused in any way. In other words, information security implies protection of information from illegal access or modification.
Q6. What are the main reasons that restrict users from performing financial transaction online?
Ans. It has been found that mainly two reasons restrict users from performing financial transactions online:
- Reluctance to provide sensitive information, such as credit card details or bank account details because of security concerns.
- The desire of users to check the goods before purchasing them.
Q5. What do you understand by SSL?
Ans. The Secure Socket Layer (SSL) is a protocol which ensures that sensitive information can be transmitted safely online. It establishes an encrypted link between a Web server and a browser to ensure the security of the information that is exchanged between the two. Today, millions of websites use SSL to provide protection to their users.
Q4. Why do you need to install antivirus software in your computer?
Ans. As you know, viruses can damage your computer or access sensitive information on it. To avoid such a situation, you must install anti-virus software on your computer. Without an anti-virus, your computer will remain susceptible to virus attacks.
Q3. What do you understand by quarantining a virus?
Ans. Quarantine means keeping the virus in some isolated place on your computer under strict vigilance so that it cannot do further harm to your computer. If you think the program may be a virus, you can send the quarantined virus to the antivirus vendor, where researchers examine it, determine its signature, name and catalog it and release its antidote. Read More …
Q2. How does antivirus software work?
Ans. Antivirus software installed in your computer works by finding out whether the virus that has attacked your computer is already known or unknown. If it is a known virus (one that has already been detected and has an antidote written for it), the software looks for the virus’s signature, a unique string of bytes similar to a fingerprint that identifies the virus, and removes it from your computer. Most scanning software is able to detect not only an initial virus but also several of its variants because the signature code usually remains intact.
In the case of new viruses for which no solution has been created, the virus scanning software employs heuristics that look for unusual virus-like activity on your computer. If the program finds any suspected activity, it quarantines the questionable program and broadcasts a warning to you about what the program may be trying to do (such as modifying your Windows Registry).
Q1. How does phishing take place?
Ans. Phishing refers to a technique of obtaining personal information, such as login name, password, and credit card details of another person without his/her knowledge or consent. Phishing normally takes place through e-mail or instant messaging. In phishing, an imposter sends you an e-mail or uses a website that looks genuine to trick people into giving important information about them.
For example, the imposter may send an e-mail (which appears genuine to you), pretending to be a representative of your company. In the e-mail, he may ask you to update your information online by clicking a specified link. As you click the link, you may be redirected to a fraudulent website where you are asked to enter important information about yourself, which can later be used for cyber-crime and fraud.
Q7. How is online backup beneficial as compared to other types of backup?
Ans. In online data backup, you send your data to a remote server through the Internet. You can easily restore your data in case of data loss by connecting to the remote server. Online backup is a very convenient method for restoring data, especially for businessmen on the move since it can be done from anywhere in the world.
The advantages of online backup are as follows:
- Costs less than other modes of backup.
- Does not need hardware, such as CDs and DVDs to take the backup; therefore, it saves you the trouble of maintaining or repairing hardware.
- Allows you to restore your backup from any location in the world anytime.
- Provides a high level of security as your data is encrypted before it is sent to the remote server.
- Keeps your backup safe from threats, such as theft, fire, earthquake, and other such disasters as the backup is stored on a remote server.
Q6. What are the circumstances in which you can lose your data?
Ans. Circumstances in which data can be lost are:
- Hardware failure: Refers to the failure of computer hardware devices due to their limited lifetime. Hardware failures, such as corruption of the hard disk drive, may lead to data loss. Therefore, during hardware failure, the lost data can be restored from a backup.
- Accidental deletion or modification of data: Refers to the threat of accidental deletion or modification of data. For example, you may accidentally delete an important file from your computer. In such a case, the deleted file can be restored from a backup.
- Restoration of the old version of a file: Regular backups allow you to recover the old information. If you need to access an old version of a modified file, you can do so if regular backups have been performed on your computer data.
- Unauthorized deletion or modification of data: Regular backups allow you to restore data that has been deleted or modified by an unauthorized user.