Preview

02 - What are viruses and malware

 1. Viruses and spyware can __________________________.

  attack your home (bricks and mortar)

  attack your body (via the skin)

  attack you via the air (wi-fi radiation)

  attack your computer.

 2. Opening email attachments such as .exe files should be done with great caution as they could be infected.

  TRUE

  FALSE

 3. Malware, short for malicious software, is a kind of software that can be installed on a computer _______________ from the computer's owner.

  with full approval

  without approval

  with instructions

  with useful content

 4. There are different kinds of malware that can hurt computers, such as viruses and spyware.

  TRUE

  FALSE

 5. When_________________ is not installed, malware can get into the computer.

  Microsoft Office

  the Internet

  Google Chrome

  security software (anti virus or anti malware)

 6. There are a lot of ways malware can get onto someone's computer. One common way is through _______________.

  bodily fluids

  saliva (spit)

  hand to hand contact

  email attachments

 7. Sometimes a victim gets malware just by _______________________________________. This is called drive-by downloading.

  going to a website with the malware hidden on it

  breathing in the air

  touching a computer with a USB

  connecting to a wi-fi router

 8. Viruses are a kind of malware that need a user-run program to work. They _______________ or move from one computer to another without a program to host them.

  cannot copy themselves

  eaily spread

  only copy themselves with permission

  can copy themselves

 9. Worms are a lot like viruses. However, they're able to move through the internet and _____________________________________________.
earlyyears_viruses_malware_pic1.jpeg

  copy themselves onto computers without help from a host program.

  copy themselves but only with help from a host program.

  even cause people to die.

  do so through the air (e.g through wifi radiation)

 10. Antivirus software updates frequently to add to a _____________________________________.

  book that is held in the British Museum in London, United Kingdom.

  pre-existing list of known viruses and their behaviours.

  super computer's hard drive.

  government check list in the United States.

 11. Trojan horses are like a much more dangerous version of a virus. They need a ___________________ to work and cannot copy themselves from one computer to another.
Interesting note: The Trojan Horse is a story from the Trojan War about the 
subterfuge that the Greeks used to enter the independent 
city of Troy and win the war. In the canonical version, after
 a fruitless 10-year siege, the Greeks constructed a huge 
wooden horse, and hid a select force of men inside including 
Odysseus.
earlyyears_viruses_malware_trojanhorse.jpg

  small animal or actual human

  wifi router

  user to agree to run a program

  very hot environment

 12. Adware is a type of malware that earns the program authors money with ____________. These programs show users ads and force them to use websites that make money for the malware writers.

  certificates

  legal and useful help

  advertising

  tutorials

 13. Spyware is a more dangerous kind of adware that steals more information from a user. Spyware can steal someone's Internet traffic and account passwords.

  TRUE

  FALSE

 14. Malware can also get onto a computer if it tricks a user into putting it there themselves. This can happen when a user plugs in a_____________ that has a virus on it already.

  wi-fi router

  finger

  USB flash drive

  tap or filter

 15. Antivirus software protects your computer from online attacks using a variety of methods. One key way is on-access scanning.

  TRUE

  FALSE