Three statements are shown below. Two are true and one is a lie. Click on the statement that is the lie.
Fill in the Blanks
Click on words from the word bank below to fill in the blanks in the paragraph.
Safe computing practices include downloading files and software only from trusted ____ and avoiding suspicious websites or unverified ____ links. Being cautious with email ____, especially those from unknown or unexpected senders, is essential. Scanning attachments with antivirus software before opening helps prevent virus infections and protects system ____.
Word Bank (Click words to fill in blanks):
securitydownloadattachmentssources
To protect against computer viruses, it is important to regularly antivirus software.
Some common types of computer viruses include , worms, and ransomware.
Fill in the Blanks
Click on words from the word bank below to fill in the blanks in the paragraph.
User ____ plays a key role in virus prevention by informing users about risks associated with downloading files or software from ____ sources. Emphasizing the importance of not opening suspicious email attachments helps reduce chances of virus infection. Knowledgeable users are better equipped to identify and avoid potential ____ in their digital environment.
Word Bank (Click words to fill in blanks):
untrustedthreatseducation
Which of the following is NOT a typical harmful action performed by viruses?
How do worms differ from viruses in the way they spread?
Fill in the Blanks
Click on words from the word bank below to fill in the blanks in the paragraph.
Computer ____ are malicious programs or code fragments that ____ by attaching themselves to ____ files or software. These viruses require a ____ program or file to infect and spread when users execute or open infected files. Once activated, viruses can ____ or delete files, slow down ____ performance, or perform other harmful actions.
Which of the following is NOT a good practice for staying safe from computer viruses?
Fill in the Blanks
Click on words from the word bank below to fill in the blanks in the paragraph.
One effective method to defend against viruses is to install reputable ____ software that can detect and remove malicious threats. It is crucial to keep this software ____ updated to identify new ____ variants. Additionally, keeping the operating system and other software up to date with the latest security ____ minimizes vulnerabilities that viruses may exploit.
Word Bank (Click words to fill in blanks):
regularlyviruspatchesantivirus
What is a computer virus?
How can computer viruses commonly be transmitted?
Fill in the Blanks
Click on words from the word bank below to fill in the blanks in the paragraph.
Performing regular ____ of important data is a critical defense strategy. In the event of a virus infection, having clean backups allows users to restore their ____ without significant loss. This practice ensures continuity and helps mitigate damage caused by viruses that may ____ or corrupt essential files, maintaining system ____.
Word Bank (Click words to fill in blanks):
integritybackupsdeletedata
Phishing emails may contain links to websites that can infect your computer with a virus.
What is a computer virus?
To avoid getting a computer virus, it is important to only download files from sources.
What is the primary method Trojan horses use to infect a system?
Which of the following actions can help prevent virus infections?
Spot the Lie...
Three statements are shown below. Two are true and one is a lie. Click on the statement that is the lie.
One way to protect your computer from viruses is to install software.
Computer viruses can be spread through USB drives.
What is the best initial step to take if you suspect your computer is infected with a virus?