Vous êtes sur la page 1sur 11

Information Technology

5. FILE AND DISK UTILITIES


Information Technology
5. FILE AND DISK UTILITIES

Q1. Fill in the blanks:


1. A File is a collection of data or information.
2. The maximum length of the file name in WinXP is up to 255 characters.
3. File name extension is the identification of a file.
4. File name extension appears at the end of filename followed by a period.
5. Directory is used to store different files on hard drive.
6. The Directory is a collection of different files and directories.
7. Directory allow to organize all files in a proper way so that can be easily searched.
8. A file archival is a program which combines more than one files into one archive file.
9. The process of making archival file is called as archiving or packing.
10. The process of conversion of archival file into its original format is called unarchiving or unpacking.
11. A Compression is the reduction in size of data or file in order to save space, transmission time etc.
12. The Lossless compression can reduce file size without a loss of information in the process.
13. The Lossy compression reduces the size of a file by elimination bits of information.
14. Encryption is a conversion of plain data into cipher text.
15. Decryption is a process of converting of into its original form.
16. Total free space of memory is broken into little pieces; this process is called Fragmentation.
17. To reduce the amount of Fragmentation process is Defragmentation.
18. Firewall is a barrier between two network.
19. The Firewall - a wall between internal and external network to Protect out data from unauthorized access.
20. The Firewall is a system designed to prevent unauthorized access from a Private network.
21. The software can help to protect your computer against Viruses and worms – Antivirus.
22. The software can help to protect your computer from spyware – Antispyware.
23. Read permits viewing and listing of files and subfolders.
24. Write permits adding of files and subfolders.
25. Read & Execute permits viewing and listing of files and subfolders as well as executing of files.
26. List Folder Contents permits viewing and listing of files arid subfolders as well as executing of files
inherited by folders only.
27. Modify permits reading and writing of files and subfolders.
28. Full Control permits reading, changing, writing, deleting of files and subfolders.
29. The Threat is a potential occurrence.
30. Computer Virus are small software programs that are designed to spread from one computer to other to
corrupt data.
31. The virus replicated and takes action when it is executed – Direct Action.
32. The virus affects the boot sector of a floppy or hard disk – Boot.
33. The Directory virus changes the path that indicates the location of the file.
34. The File Infectors type of virus infects programs or executable files.
Q2. State whether the following statements are true or false:
1. A File is a collection of data or information. True
2. The maximum length of the file name in WinXP is up to 278 characters. False
3. Directory is the identification of a file. False
4. File name extension appears at the end of filename followed by a period. True
5. File is used to store different files on hard drive. False
6. The Directory is a collection of different files and directories. True
7. File allow to organize all files in a proper way so that can be easily searched. False
8. A file archival is a program which combines more than one files into one archive file. True
9. The process of making archival file is called as archiving or packing. True
10. The process of conversion of archival file into its original format is called archiving. False
Information Technology
5. FILE AND DISK UTILITIES

11. A Compression is the reduction in size of data or file in order to save space,
transmission time etc. True
12. The Lossy compression can reduce file size without a loss of information in the process. False
13. The Lossy compression reduces the size of a file by elimination bits of information. True
14. Encryption is a conversion of plain data into cipher text. True
15. Encryption is a process of converting of into its original form. False
16. Total free space of memory is broken into little pieces; this process is called Fragmentation. True
17. To increase the amount of Fragmentation process, Defragmentation is used. False
18. Threat is a barrier between two network. False
19. The Firewall is a wall between internal and external network to Protect out data from
unauthorized access. True
20. The Firewall is a system designed to prevent unauthorized access from a Private network. True
21. The software which help to protect your computer against Viruses and worms is Antivirus. True
22. The software can help to protect your computer from spyware is Antivirus. False
23. Read permits viewing and listing of files and subfolders. True
24. Read permits adding of files and subfolders. False
25. Read permits viewing and listing of files and subfolders as well as executing of files. False
26. Write permits viewing and listing of files and subfolders as well as executing of files
inherited by folders only. False
27. Modify permits reading and writing of files and subfolders. True
28. Full Control permits reading, changing, writing, deleting of files and subfolders. True
29. The Threat is a potential occurrence. True
30. Antivirus are small software programs that are designed to spread from one computer
to other to corrupt data. False
31. The virus replicated and takes action when it is executed – Direct Action. True
32. The virus affects the boot sector of a floppy or hard disk – Boot. True
33. The Boot virus changes the path that indicates the location of the file. False
34. The File Infectors type of virus infects programs or executable files. True
Q3. Multiple Choice Questions Single Correct Answers:
1. The process of making archival file is called as _____________.
a) Package b) archiving c) unpacking d) removing
2. The process of conversion of archival file into its original format is called __________.
a) Packing b) archiving c) unarchiving d) Non – packing
3. The file extension of archive file is ____________.
a) .zip b) .exe c) .bat d) .docx
4. ___________ is the most popular windows program that compresses files.
a) Exe b) Downloader c) Winzip d) Compiler
5. A _________is a collection of data or information.
a) Folder b) Directory c) file d) System
6. The maximum length of the filename in WinXP is upto _________ characters.
a) 276 b) 255 c) 156 d) 225
7. ___________ the identification of a file.
a) File name extension b) Folder name extension
c) Report name extension d) System name extension.
8. File name extension appears at the end of filename followed by a ___________.
a) Permission b) extension c) Prefix d) period
9. ____________is used to store different files on hard drive.
a) Directory b) System c) File d) Form
Information Technology
5. FILE AND DISK UTILITIES

10. The ________ is a collection of different files and directories.


a) Directory b) System c) File d) Form
11. __________ allow to organize all files in a proper way so that can be easily searched.
a) Directory b) System c) File d) Form
12. A ___________ is a program which combines more than one files into one archive file.
a) File retrieval b) File archival c) File system d) Type archival
13. _________ is the reduction in size of data or file in order to save space, transmission time etc.
a) Decompression b) Information c) Resubmission d) Compression
14. __________compression can reduce file size without a loss of information in the process.
a) Loss b) Lossy c) Lossless d) Lonely
15. The __________ compression reduces the size of a file by elimination bits of information.
a) Loss b) Lossy c) Lossless d) Lonely
16. _______ is a conversion of plain data into cipher text.
a) Encryption b) Decryption c) Lossy d) Lossless
17. ___________ is a process of converting of cipher text into its original form.
a) Encryption b) Decryption c) Lossy d) Lossless
18. Total free space of memory is broken into little pieces; this process is called __________.
a) Fragmentation b) Defragmentation c) compression d) Decrypt
19. To reduce the amount of Fragmentation ___________ process is used.
a) Fragmentation b) Defragmentation c) compression d) Decrypt
20. ____________ is a barrier between two network.
a) Antivirus b) Firewall c) Worms d) Virus
21. The ________ a wall between internal and external network to protect data from unauthorized access.
a) Antivirus b) Firewall c) Worms d) Virus
22. The ______ is a system designed to prevent unauthorized access from a private network.
a) Antivirus b) Firewall c) Worms d) Virus
23. The software can help to protect your computer against viruses and Worms.
a) Antivirus b) Firewall c) Worms d) Virus
24. The software can help to protect your computer from spyware.
a) Antispyware b) Spyware c) Antivirus d) Firewall
25. ___________ permits viewing and listing of files and subfolders.
a) Write b) Folder c) Read d) Delete
26. _____________ permits adding of files and subfolders.
a) Write b) Folder c) Read d) Delete
27. ____________ permits viewing and listing of files and subfolders as well as executing of files.
a) Read b) Write c) Modify d) Read & Execute
28. __________ permits viewing and listing of files and subfolders as well as executing of files inherited by folders
only.
a) Read b) Modify c) List Folder Contents d) Write
29. _____________ permits reading and writing of files and subfolders.
a) Read b) Write c) Delete d) Modify
30. ___________ permits reading, changing, writing, deleting of files and subfolder.
a) Read b) Full Control c) Write d) Modify
31. The __________ is a potential occurrence.
a) Threat b) Firewall c) Virus d) System
32. _____________ are small software programs that are designed to spread from one computer to other to corrupt
data.
a) System b) Computer Virus c) Client d) User
Information Technology
5. FILE AND DISK UTILITIES

33. The virus replicated and takes action when It is executed.


a) Direct Action b) Boot Sector c) Directory d) Folder
34. The ________ virus affects the boot sector of a floppy or hard disk.
a) Boot b) File infectors c) Directory Virus d) Macro virus
35. The __________ type of Virus infects programs or executable files.
a) Boot Virus b) File infectors c) Directory Virus d) Macro virus
Q4. Multiple Choice Questions (Two correct answers)
1. The file extension of archive file is ______
a) .docx b) .zip c) .exe d) .rar e) .win
2. ____________ is the most popular windows program that compresses files.
a) Winrar b) Downloader c) Winzip d) Complier e) tally
3. For compression of data two different algorithms are used
c) Lossy Compression b) Lose compression c) Lossless compression d) Loss compression
e) Lost compression
4. There are different types of Firewalls like
a) Network Level Firewall b) System Level Firewall c) Application level Firewall
d) Structure level Firewall e) Internet level firewall
5. File permission includes ____________.
a) Modify b) Read & Execute c) List Folder contents d) append e) write
6. Folder permission includes ____________.
a) Modify b) Read & Execute c) List Folder contents d) append e) write
7. Computer viruses are spread by _____________.
a) Attachments in email b) Audio video files c) Password d) User e) Acknowledge
8. Different types of viruses are ____________.
a) Overwrite Viruses b) Macro Virus c) Mini Virus d) Magic Virus e) Mono Lines
9. Examples of Boot virus are ___________.
a) .exe b) Polyboot c) AntiExe d) .C0M e) EVS

Q5. Multiple choice questions (Three Correct Answers)


1. The file extension of archive file is_____________.
a) .docx b) .zip c) .exe d) .rar e) .tar f) .win
2. _____________ is the most popular windows program that compresses files.
a) Winrar b) Downloader c) Winzip d) Complier e) IZarc f) Terra
3. There are different types of Firewalls like __________.
a) Network Level Firewalls b) System Level Firewall c) Application Level Firewall
d) Structure Level Firewall e) Circuit level Firewall f) Internet Level Firewall
4. The three types of user accounts in windows are ___________
a) Standard b) Administrator c) Guest d) Client e) Server f) Internet
5. File permission includes ______________.
a) Modify b) Read & Execute c) List Folder contents d) append e) Write f) backend
6. Folder permission includes __________.
a) Modify b) List Folder contents c) change d) append e) Read f) backend
7. Computer Viruses are spread by ___________.
a) Password b) User c) Attachments in Email d) Audio and Video File e) greeting Cards
8. Different types of viruses are _________.
a) Mini Virus b) Macro Virus c) Worms d) Magic Virus e) Logic Bombs f) Mono Virus
File and Disc Utility
Define the following concepts:
1. Filename:
Filename refers to the name given to that file. All the information is stored in the
file. There are different types of files: text – file, program files, directory files, and
so on. All the files store different types of information.

There are different rules for the filename:
a) The maximum length of the file in windows XP is 255 characters.
b) One cannot use special characters such as < (less than), > (more than), :
(colon) etc.
c) One can make use of letters and numbers or both while writing filename.
d) One can use uppercase or lowercase or both while writing the filename.
2. Encryption:
In cryptography, encryption is the process of encoding a message or
information in such a way that only authorized parties can access it and those
who are not authorized cannot.
In an encryption scheme, the intended information or message, referred to
as plaintext, is encrypted using an encryption algorithm – a cipher –
generating cipher text that can be read only if decrypted.
Encryption is one of the most imporstant methods for providing data security,
especially for end-to-end protection of data transmitted across networks.
3. Firewall:
A firewall is software used to maintain the security of a private network.
Firewalls block unauthorized access to or from private networks and are often
employed to prevent unauthorized Web users or illicit software from gaining
access to private networks connected to the Internet. A firewall may be
implemented using hardware, software, or a combination of both.
A firewall is recognized as the first line of defence in securing sensitive
information. For better safety, the data can be encrypted.
4. Computer Virus
Viruses are malicious programs that spread throughout computer files without
user knowledge. Most widespread virus infections spread through email
message attachments that activate when opened. The vicious cycle of a virus
perpetuates as infected emails are forwarded to multiple users. Viruses also
spread through shared media, such as Universal Serial Bus (USB) drives.
5. Worms:
A worm locates a computer’s vulnerability and spreads within its connected
network like an infection, while continually seeking new vulnerabilities. Like
viruses, worms often originate from e-mail attachments that appear to be from
trusted senders. Worms then spread to a user’s contacts via his e-mail account
and address book.
Some worms spread and then do nothing while others cause harm. In such cases,
the worm’s code is known as payload.

Write short note on the following:

1. Password Security:
a) Password protection is a security process that protects information
accessible via computers that needs to be protected from certain users.
b) Password protection allows only those with an authorized password to
gain access to certain information.
c) Sometimes the hacker is someone you know. It could be a “frenemy” who
wants to access your information. If so, he or she might be able to guess
your password if you use one that’s as obvious as your dog’s name or
child’s name. An insider may be able to access your account if the answers
to your password recovery questions are known.
d) If a hacker is unknown to you, a brute force attack is the most common
strategy for cracking your password. In this method, a program
systematically tries every password combination until it gains access.
That is why the simpler your password is, the easier it is for someone to
gain access.
2. Polymorphic Virus
a) A polymorphic virus is a complicated computer virus that affects data
types and functions.
b) It is a self-encrypted virus designed to avoid detection by a scanner. Upon
infection, the polymorphic virus duplicates itself by creating usable
slightly modified, copies of itself.
c) In order to detect polymorphic viruses, a scanner with strong string
detection that enables it to scan several different strings - including one
for each possible decryption scheme - is necessary.
d) An example of polymorphism would be if the “C” key was switched to “D,”
or “4” to “5,” and so on.
3. Logic Bombs
a) A logic bomb is a malicious program timed to cause harm at a certain
point in time, but is inactive up until that point.
b) A set trigger, such as a pre-programmed date and time, activates a logic
bomb. Once activated, a logic bomb implements a malicious code that
causes harm to a computer.
c) A logic bomb's application programming points may also include other
variables such that the bomb is launched after a specific number of
database entries.
d) A logic bomb may be implemented by someone trying to sabotage a
database when they are fairly certain they won’t be present to experience
the effects, such as full database deletion. In these instances, logic bombs
are programmed to exact revenge or sabotage work.
e) A logic bomb is also known as slag code or malicious logic.

Differentiate between the following:
1. Fragmentation and defragmentation:
Fragmentation Defragmentation
a) Fragmentation is caused b) Defragmentation is the term
when an operating system given to the process of scanning
breaks a file into pieces the file system and re-joining
because there is not enough the split files back into
space on the storage device consecutive pieces.
where the file was originally
saved.

b) Fragmentation occurs when b) Defragmentation, then, is the
the file system cannot or will process of un-fragmenting or
not allocate enough contiguous piecing together,
space to store a complete file as those fragmented files so they
a unit, but instead puts parts of sit closer - physically - on the
it in gaps between existing files drive or other media,
potentially speeding up the
drive's ability to access the file.



2. Lossy compression and Lossless compression

Lossy Compression Lossless Compression

1. The technique involves some 1. It involves no loss of
loss of information. information.

2. Data that has been compressed 2. If data has been (lossless)
using this technique can’t be compressed, the original data
recovered and reconstructed can be recovered from the
exactly. compressed data.

3. Used for application that can 3. Used for application that can’t
tolerate difference between the tolerate any difference between
original and reconstructed data. original and reconstructed data.

4. In return for accepting this 4. No loss in information so
distortion in reconstructed data compression rate is small.
we obtain high compression
rate

5. Sound and Image compression 5. Text compression uses lossless
uses lossy compression. compression

6. More data can be 6. Less data can be accommodated
accommodated in channel. in channel.



Answer the following in Brief:
1. Disk Compression:
a) A type of data compression that works by storing compressed versions
of files on the hard disk.
b) A disk compression utility sits between the operating system and the disk
drive.
c) Whenever the operating system attempts to save a file to disk, the utility
intercepts it and compresses it. Likewise, when the operating system
attempts to open a file, the disk compression utility intercepts the file,
decompresses it, and then passes it to the operating system.
d) Because all applications access files through the operating system, disk
compression utilities work with all applications.
e) The entire process is transparent to the user, though opening and closing files
may take a little longer.
f) Windows comes with a built-in disk compression utility called DriveSpace.
g) You can also purchase third-party disk compression utilities for Windows
and other operating systems.
2. File archival
a) An archive is a single file that contains multiple files and/or folders.
b) Archives may be created by several different file archiving utilities and can be
saved in one of several different formats. They may also be compressed to
reduce the file size or encrypted for security purposes. The term "archive"
can also be used as a verb, which refers to the process of creating an archive.
c) Archives are useful for consolidating multiple files and folders into a single
file. They are commonly used for backing up data and transferring multiple
files between users. For example, a Web developer may save all
the HTML, CSS, and image files for a website in a single archive to share with
graphic designer.
d) By consolidating all the files in an archive, the developer only needs to send
one file to the designer. If the archive is compressed, it will also take less time
to transfer online.
3. Computer Security
a) In the computer industry, the term security -- or the phrase computer
security -- refers to techniques for ensuring that data stored in
a computer cannot be read or compromised by any individuals without
authorization.
b) Most computer security measures involve data encryption and passwords.
Data encryption is the translation of data into a form that is unintelligible
without a deciphering mechanism.
c) A password is a secret word or phrase that gives a user access to a
particular program or system.
d) The meaning of the term computer security has evolved in recent years.
Before the problem of data security became widely publicized in the media,
most people’s idea of computer security focused on the physical machine.
Traditionally, computer facilities have been physically protected for three
reasons:
a) To prevent theft of or damage to the hardware
b) To prevent theft of or damage to the information
c) To prevent disruption of service

4. Malicious Software
a) Malicious software, commonly known as malware, is any software that
brings harm to a computer system.
b) Malware can be in the form of worms, viruses, Trojans, spyware, adware and
rootkits, etc., which steal protected data, delete documents or add software
not approved by a user.
c) Malware is software designed to cause harm to a computer and user. Some
forms of malware “spy” on user Internet traffic.
d) Examples include spyware and adware. Spyware monitors a user’s location
and if enabled, it can capture sensitive information, e.g., credit card numbers,
promoting identity theft.
e) Adware also acquires user information, which is shared with advertisers and
then integrated with unwanted, triggered pop-up ads.
f) Anti-malware should determine if there are threats by scanning a computer
and removing them, if found. Prevention is better than corrective action after
infection.
g) Although anti-virus programs should be continually enabled and updated,
certain types of threats, like spyware, often make their way into a computer
system.

• Explain the top five external threats to Corporate IT system and suggest
approach to fight with them:
We look at the top five cyber security threats facing business today, and
suggest what can be done to prepare for and defend against them.
a) Viruses:
In terms of sheer frequency, the top spot on the list of security threats must go to
viruses. According to a DTI survey, 72% of all companies received infected emails
or files in 2003, rising to 83% for larger companies. Worms and Trojan horses share
the first prize in malignancy.
b) Virus back doors:
i. The after-effects of viruses are so dangerous that they take second
place. The vulnerability here is the back doors viruses leave in their
wake, or the chinks in the corporate armour that later generations of
code can exploit.
ii. Another related threat is the worms that turn PCs into remote mail
servers and send cascading volumes of emails that cause denial of
service attacks. These attacks are becoming more sophisticated.
c) Application-specific hacks:
i.Hacks, and application-specific hacks in particular, have become smarter.
Many companies are alert to the threat posed by so-called buffer overflows,
the techniques by which web servers are overloaded causing a denial of
service attack.
ii. SQL injection forces a database to yield otherwise secure information by
causing it to confuse classified data, such as passwords or blueprints, with
information that is for public consumption, such as product details or
contacts.
iii. Ransomware is the example which that prevents users from accessing their
system or personal files and demands ransom payment in order to regain
access.
d) Phishing

i. Phishing, or identity theft, is most commonly targeted at bank customers but


everybody should be alert to it.
ii. The bank users receive an email as if from the bank asking for their
password. According to risk specialist company mi2g, less than half of 1% of
customers oblige – a significant figure if millions of emails are sent.
iii. A more sophisticated version of phishing, cross-site scripting, is on the rise,
where users are driven to an identical but fake version of the bank’s website
and are lured into handing over confidential information.

e) Blended attacks
Blended attacks are combinations of two or more of the above and are doubly
alarming. The solution to protecting a company against these attacks is to
combine the piecemeal security systems that protect against each kind of
threat.
Three layers of protective measures:
i. Most of the measures companies can take to protect themselves are
reactive, and antivirus patches and firewalls are now, for the most part,
implemented as standard.
ii. But these are responses to known attacks, rather than an anticipation of
the unexpected. They do nothing to thwart the activities of worms that
turn PCs into machines from which further attacks, such as mass emailing,
can be launched. Nor can they deal with the more sophisticated hacks,
such as SQL injection.
iii. To combat this level of threat, additional security must also be in place.
This security can be grouped in three layers:
• The first layer scans IT systems for suspect activities by using
intrusion prevention technology and by monitoring anomalous
requests.
• A second layer is added when defences are integrated. For
example, if a virus is known to open up a back door, the antivirus
system should not only search for the virus but also for the back
door.
• The third layer is good risk assessment.

Vous aimerez peut-être aussi