Class 9 Exam  >  Class 9 Notes  >  Information & Computer Technology (Class 9) - Notes & Video  >  NCERT Solutions - Security Threats and Safety Measures, Information & Computer Technology Class 9

Security Threats and Safety Measures, Information & Computer Technology Class 9 NCERT Solutions | Information & Computer Technology (Class 9) - Notes & Video PDF Download

NCERT Solutions
Match the following

(1) Virus (a) “Get Rich Quick” Scheme
(2) Worm (b) Cool Web Search
(3) Trojan Horse (c) I Love You
(4) Spyware (d) Jerusalem
(5) Spam (e) Wazzo 

Answer

(1) Virus (a) Wazzo
(2) Worm (b) Jerusalem
(3) Trojan Horse (c) I Love You
(4) Spyware (d) Cool Web Search
(5) Spam (e) “Get Rich Quick” Scheme 


Answer the following questions:

Q1. While working on the computer, you notice that the system is working very slowly, files are corrupted, default home page on the web browser has changed, lot memory is consumed, and unnecessary pop-ups are coming. What can be the probable reason?
Answer
The computer gets infected from Spyware. It monitors user activity on the Internet and transmits that
information in the background to someone else. Spyware can also gather information  about e-mail addresses and even passwords and credit card numbers. It also sends information back to the spy ware’s home base via the user’s Internet connection, thus it eats user’s internet bandwidth.

Q2. You have very important data on your computer. How will you ensure that this data remainssafe?
Answer
We can make our important data safe on computer through below steps:
1. Using Security software such as Norton antivirus, Symantec etc.
2. Beware of email attachments form unknown sources
3. Do not randomly download material from websites which has not been checked for security.
3. Never propagate hoax or chain emails.
4. Frequently back up important data and files.
5. Use encryption or sites that use encrypted data.

Q3. Differentiate between virus, worms and Trojan horses.
Answer
Virus- A computer virus is a program usually hidden within another simple program. It produces copies of itself and inserts them into other programs or files, in turn destroying the data and performing other malicious actions. Computer viruses are never naturally occurring; they are always man-made.

Worms- Worms are very similar to viruses in the manner that they are computer programs that
replicate copies of themselves (usually to other computer systems via network connections). Unlike viruses, worms exist as separate entities; they do not attach themselves to other files or programs.

Torjan Horses- A Trojan horse is a program that claims to rid your computer of viruses but instead
introduces viruses into the system. The Trojan program does not attach itself to the files like a virus nor replicate itself like a worm but it does provide unauthorized access to user’s computer. They are mostly spread through internet downloads and online gaming programs. They mostly affect the targeted computers.

Q4. How is a hacker different from a cracker?
Answer
Hackers are gifted programmers who gain access to the systems or network to show case the security loopholes to the administrators.
Cracker is an activist who had intentions of doing malicious activities. Crackers have an end goal of destroying data and network for personal monetary gains.

The document Security Threats and Safety Measures, Information & Computer Technology Class 9 NCERT Solutions | Information & Computer Technology (Class 9) - Notes & Video is a part of the Class 9 Course Information & Computer Technology (Class 9) - Notes & Video.
All you need of Class 9 at this link: Class 9
15 videos|19 docs|6 tests

Top Courses for Class 9

FAQs on Security Threats and Safety Measures, Information & Computer Technology Class 9 NCERT Solutions - Information & Computer Technology (Class 9) - Notes & Video

1. What are security threats in information and computer technology?
Ans. Security threats in information and computer technology refer to any potential risks or vulnerabilities that can compromise the confidentiality, integrity, or availability of data and computer systems. These threats can include malware, hacking attacks, data breaches, phishing scams, and unauthorized access, among others.
2. How can we ensure safety measures in information and computer technology?
Ans. To ensure safety measures in information and computer technology, one can follow the following steps: - Install and regularly update antivirus and anti-malware software. - Use strong and unique passwords for all accounts and change them regularly. - Enable two-factor authentication whenever possible. - Regularly backup important data and store it securely. - Keep software and operating systems up to date with the latest security patches. - Be cautious while clicking on suspicious links or downloading attachments from unknown sources. - Educate oneself and others about safe online practices and the importance of cybersecurity.
3. What are the common types of security threats in computer networks?
Ans. Some common types of security threats in computer networks are: - Malware: This includes viruses, worms, Trojans, and ransomware that can infect and damage computer systems. - Denial-of-Service (DoS) Attacks: These attacks overload a network or website, making it inaccessible to legitimate users. - Phishing: This involves tricking users into revealing sensitive information, such as passwords or credit card details, by pretending to be a trustworthy entity. - Hacking: Unauthorized access to computer systems or networks with the intent of stealing or modifying data. - Data Breaches: Occur when sensitive or confidential data is accessed, stolen, or exposed without authorization.
4. How can individuals protect themselves from security threats online?
Ans. Individuals can protect themselves from security threats online by following these measures: - Use strong and unique passwords for each online account. - Be cautious while clicking on links or downloading attachments from unknown sources. - Regularly update all software and operating systems. - Enable two-factor authentication for added security. - Avoid sharing personal or sensitive information on unsecured websites. - Regularly back up important data and store it securely. - Use a reliable and up-to-date antivirus program.
5. What are the consequences of security threats in information and computer technology?
Ans. The consequences of security threats in information and computer technology can be severe and include: - Unauthorized access to personal or sensitive information, leading to identity theft or financial loss. - Damage to computer systems, resulting in loss of data and productivity. - Disruption of services or operations, causing financial and reputational damage to organizations. - Spread of malware or viruses, affecting multiple systems and networks. - Legal and regulatory consequences, such as fines or lawsuits, in case of data breaches or non-compliance with security standards.
Explore Courses for Class 9 exam

Top Courses for Class 9

Signup for Free!
Signup to see your scores go up within 7 days! Learn & Practice with 1000+ FREE Notes, Videos & Tests.
10M+ students study on EduRev
Related Searches

Security Threats and Safety Measures

,

Semester Notes

,

Sample Paper

,

pdf

,

Security Threats and Safety Measures

,

Previous Year Questions with Solutions

,

Security Threats and Safety Measures

,

ppt

,

Important questions

,

video lectures

,

Summary

,

shortcuts and tricks

,

Exam

,

MCQs

,

Objective type Questions

,

mock tests for examination

,

Extra Questions

,

study material

,

Free

,

past year papers

,

Information & Computer Technology Class 9 NCERT Solutions | Information & Computer Technology (Class 9) - Notes & Video

,

practice quizzes

,

Information & Computer Technology Class 9 NCERT Solutions | Information & Computer Technology (Class 9) - Notes & Video

,

Information & Computer Technology Class 9 NCERT Solutions | Information & Computer Technology (Class 9) - Notes & Video

,

Viva Questions

;