File and Disk Utilities
File and Disk Utilities
File and Disk Utilities
11. A Compression is the reduction in size of data or file in order to save space,
transmission time etc. True
12. The Lossy compression can reduce file size without a loss of information in the process. False
13. The Lossy compression reduces the size of a file by elimination bits of information. True
14. Encryption is a conversion of plain data into cipher text. True
15. Encryption is a process of converting of into its original form. False
16. Total free space of memory is broken into little pieces; this process is called Fragmentation. True
17. To increase the amount of Fragmentation process, Defragmentation is used. False
18. Threat is a barrier between two network. False
19. The Firewall is a wall between internal and external network to Protect out data from
unauthorized access. True
20. The Firewall is a system designed to prevent unauthorized access from a Private network. True
21. The software which help to protect your computer against Viruses and worms is Antivirus. True
22. The software can help to protect your computer from spyware is Antivirus. False
23. Read permits viewing and listing of files and subfolders. True
24. Read permits adding of files and subfolders. False
25. Read permits viewing and listing of files and subfolders as well as executing of files. False
26. Write permits viewing and listing of files and subfolders as well as executing of files
inherited by folders only. False
27. Modify permits reading and writing of files and subfolders. True
28. Full Control permits reading, changing, writing, deleting of files and subfolders. True
29. The Threat is a potential occurrence. True
30. Antivirus are small software programs that are designed to spread from one computer
to other to corrupt data. False
31. The virus replicated and takes action when it is executed – Direct Action. True
32. The virus affects the boot sector of a floppy or hard disk – Boot. True
33. The Boot virus changes the path that indicates the location of the file. False
34. The File Infectors type of virus infects programs or executable files. True
Q3. Multiple Choice Questions Single Correct Answers:
1. The process of making archival file is called as _____________.
a) Package b) archiving c) unpacking d) removing
2. The process of conversion of archival file into its original format is called __________.
a) Packing b) archiving c) unarchiving d) Non – packing
3. The file extension of archive file is ____________.
a) .zip b) .exe c) .bat d) .docx
4. ___________ is the most popular windows program that compresses files.
a) Exe b) Downloader c) Winzip d) Compiler
5. A _________is a collection of data or information.
a) Folder b) Directory c) file d) System
6. The maximum length of the filename in WinXP is upto _________ characters.
a) 276 b) 255 c) 156 d) 225
7. ___________ the identification of a file.
a) File name extension b) Folder name extension
c) Report name extension d) System name extension.
8. File name extension appears at the end of filename followed by a ___________.
a) Permission b) extension c) Prefix d) period
9. ____________is used to store different files on hard drive.
a) Directory b) System c) File d) Form
Information Technology
5. FILE AND DISK UTILITIES
1. Password Security:
a) Password protection is a security process that protects information
accessible via computers that needs to be protected from certain users.
b) Password protection allows only those with an authorized password to
gain access to certain information.
c) Sometimes the hacker is someone you know. It could be a “frenemy” who
wants to access your information. If so, he or she might be able to guess
your password if you use one that’s as obvious as your dog’s name or
child’s name. An insider may be able to access your account if the answers
to your password recovery questions are known.
d) If a hacker is unknown to you, a brute force attack is the most common
strategy for cracking your password. In this method, a program
systematically tries every password combination until it gains access.
That is why the simpler your password is, the easier it is for someone to
gain access.
2. Polymorphic Virus
a) A polymorphic virus is a complicated computer virus that affects data
types and functions.
b) It is a self-encrypted virus designed to avoid detection by a scanner. Upon
infection, the polymorphic virus duplicates itself by creating usable
slightly modified, copies of itself.
c) In order to detect polymorphic viruses, a scanner with strong string
detection that enables it to scan several different strings - including one
for each possible decryption scheme - is necessary.
d) An example of polymorphism would be if the “C” key was switched to “D,”
or “4” to “5,” and so on.
3. Logic Bombs
a) A logic bomb is a malicious program timed to cause harm at a certain
point in time, but is inactive up until that point.
b) A set trigger, such as a pre-programmed date and time, activates a logic
bomb. Once activated, a logic bomb implements a malicious code that
causes harm to a computer.
c) A logic bomb's application programming points may also include other
variables such that the bomb is launched after a specific number of
database entries.
d) A logic bomb may be implemented by someone trying to sabotage a
database when they are fairly certain they won’t be present to experience
the effects, such as full database deletion. In these instances, logic bombs
are programmed to exact revenge or sabotage work.
e) A logic bomb is also known as slag code or malicious logic.
Differentiate between the following:
1. Fragmentation and defragmentation:
Fragmentation Defragmentation
a) Fragmentation is caused b) Defragmentation is the term
when an operating system given to the process of scanning
breaks a file into pieces the file system and re-joining
because there is not enough the split files back into
space on the storage device consecutive pieces.
where the file was originally
saved.
b) Fragmentation occurs when b) Defragmentation, then, is the
the file system cannot or will process of un-fragmenting or
not allocate enough contiguous piecing together,
space to store a complete file as those fragmented files so they
a unit, but instead puts parts of sit closer - physically - on the
it in gaps between existing files drive or other media,
potentially speeding up the
drive's ability to access the file.
2. Lossy compression and Lossless compression
Lossy Compression Lossless Compression
1. The technique involves some 1. It involves no loss of
loss of information. information.
2. Data that has been compressed 2. If data has been (lossless)
using this technique can’t be compressed, the original data
recovered and reconstructed can be recovered from the
exactly. compressed data.
3. Used for application that can 3. Used for application that can’t
tolerate difference between the tolerate any difference between
original and reconstructed data. original and reconstructed data.
4. In return for accepting this 4. No loss in information so
distortion in reconstructed data compression rate is small.
we obtain high compression
rate
5. Sound and Image compression 5. Text compression uses lossless
uses lossy compression. compression
6. More data can be 6. Less data can be accommodated
accommodated in channel. in channel.
Answer the following in Brief:
1. Disk Compression:
a) A type of data compression that works by storing compressed versions
of files on the hard disk.
b) A disk compression utility sits between the operating system and the disk
drive.
c) Whenever the operating system attempts to save a file to disk, the utility
intercepts it and compresses it. Likewise, when the operating system
attempts to open a file, the disk compression utility intercepts the file,
decompresses it, and then passes it to the operating system.
d) Because all applications access files through the operating system, disk
compression utilities work with all applications.
e) The entire process is transparent to the user, though opening and closing files
may take a little longer.
f) Windows comes with a built-in disk compression utility called DriveSpace.
g) You can also purchase third-party disk compression utilities for Windows
and other operating systems.
2. File archival
a) An archive is a single file that contains multiple files and/or folders.
b) Archives may be created by several different file archiving utilities and can be
saved in one of several different formats. They may also be compressed to
reduce the file size or encrypted for security purposes. The term "archive"
can also be used as a verb, which refers to the process of creating an archive.
c) Archives are useful for consolidating multiple files and folders into a single
file. They are commonly used for backing up data and transferring multiple
files between users. For example, a Web developer may save all
the HTML, CSS, and image files for a website in a single archive to share with
graphic designer.
d) By consolidating all the files in an archive, the developer only needs to send
one file to the designer. If the archive is compressed, it will also take less time
to transfer online.
3. Computer Security
a) In the computer industry, the term security -- or the phrase computer
security -- refers to techniques for ensuring that data stored in
a computer cannot be read or compromised by any individuals without
authorization.
b) Most computer security measures involve data encryption and passwords.
Data encryption is the translation of data into a form that is unintelligible
without a deciphering mechanism.
c) A password is a secret word or phrase that gives a user access to a
particular program or system.
d) The meaning of the term computer security has evolved in recent years.
Before the problem of data security became widely publicized in the media,
most people’s idea of computer security focused on the physical machine.
Traditionally, computer facilities have been physically protected for three
reasons:
a) To prevent theft of or damage to the hardware
b) To prevent theft of or damage to the information
c) To prevent disruption of service
4. Malicious Software
a) Malicious software, commonly known as malware, is any software that
brings harm to a computer system.
b) Malware can be in the form of worms, viruses, Trojans, spyware, adware and
rootkits, etc., which steal protected data, delete documents or add software
not approved by a user.
c) Malware is software designed to cause harm to a computer and user. Some
forms of malware “spy” on user Internet traffic.
d) Examples include spyware and adware. Spyware monitors a user’s location
and if enabled, it can capture sensitive information, e.g., credit card numbers,
promoting identity theft.
e) Adware also acquires user information, which is shared with advertisers and
then integrated with unwanted, triggered pop-up ads.
f) Anti-malware should determine if there are threats by scanning a computer
and removing them, if found. Prevention is better than corrective action after
infection.
g) Although anti-virus programs should be continually enabled and updated,
certain types of threats, like spyware, often make their way into a computer
system.
• Explain the top five external threats to Corporate IT system and suggest
approach to fight with them:
We look at the top five cyber security threats facing business today, and
suggest what can be done to prepare for and defend against them.
a) Viruses:
In terms of sheer frequency, the top spot on the list of security threats must go to
viruses. According to a DTI survey, 72% of all companies received infected emails
or files in 2003, rising to 83% for larger companies. Worms and Trojan horses share
the first prize in malignancy.
b) Virus back doors:
i. The after-effects of viruses are so dangerous that they take second
place. The vulnerability here is the back doors viruses leave in their
wake, or the chinks in the corporate armour that later generations of
code can exploit.
ii. Another related threat is the worms that turn PCs into remote mail
servers and send cascading volumes of emails that cause denial of
service attacks. These attacks are becoming more sophisticated.
c) Application-specific hacks:
i.Hacks, and application-specific hacks in particular, have become smarter.
Many companies are alert to the threat posed by so-called buffer overflows,
the techniques by which web servers are overloaded causing a denial of
service attack.
ii. SQL injection forces a database to yield otherwise secure information by
causing it to confuse classified data, such as passwords or blueprints, with
information that is for public consumption, such as product details or
contacts.
iii. Ransomware is the example which that prevents users from accessing their
system or personal files and demands ransom payment in order to regain
access.
d) Phishing
e) Blended attacks
Blended attacks are combinations of two or more of the above and are doubly
alarming. The solution to protecting a company against these attacks is to
combine the piecemeal security systems that protect against each kind of
threat.
Three layers of protective measures:
i. Most of the measures companies can take to protect themselves are
reactive, and antivirus patches and firewalls are now, for the most part,
implemented as standard.
ii. But these are responses to known attacks, rather than an anticipation of
the unexpected. They do nothing to thwart the activities of worms that
turn PCs into machines from which further attacks, such as mass emailing,
can be launched. Nor can they deal with the more sophisticated hacks,
such as SQL injection.
iii. To combat this level of threat, additional security must also be in place.
This security can be grouped in three layers:
• The first layer scans IT systems for suspect activities by using
intrusion prevention technology and by monitoring anomalous
requests.
• A second layer is added when defences are integrated. For
example, if a virus is known to open up a back door, the antivirus
system should not only search for the virus but also for the back
door.
• The third layer is good risk assessment.