Page 73 - CA 165 ver 1.0 Class 9
P. 73
Unsolved Exercise
PART A
A. Very short answer type questions.
1. Which software or hardware helps in keeping a network secure?
2. What can be a combination of alphabet, numbers and special characters that can be used to protect our
valuable content?
3. What term can be used when Internet and other types of electronic communications is used to harass or
threaten other people?
4. Name four common types of malware.
5. Which software is used to safeguard or prevent the computer from virus and for cleaning the unwanted
programs?
6. Give one example of popular antivirus.
B. Case Based MCQs
Privacy in Information Technology refers to personal control over one’s own files and documents. It also refers
to the right and ability to keep control over the information that one reveals or uploads over the internet and
to have a control over the selection of viewers or users who can access that information.
1. When visiting sites where you win something or they are giving something away, you will ...............................
i. give your name, phone number, and address ii. give parents information
iii. give no personal information iv. give whatever information they request
2. You are online and you get an instant message from your internet service provider needing your password
.....................................
i. I give it to them because they are my ISP ii. I ask them why they need it
iii. I never give my password to anyone iv. I log off without giving any information
3. What is the private browsing mode in Internet Explorer/Edge called?
i. InPrivate ii. Incognito
iii. PrivateIn iv. All of these
C. Fill in the blanks.
1. The .................................... is the most significant innovation of mankind.
2. .................................... and .................................... programs offer real-time protection and restrict the computer
from getting affected by malwares.
3. .................................... are the programs that are created on the local computer when you visit the website.
4. .................................... should be combination of alphabet, numbers and special characters so that it is not
easy to be cracked by others.
5. .................................... in Information Technology refers to personal control over one’s files and documents.
6. .................................... is the national nodal agency for responding to incidents related to computer security
incidents.
7. The one who sends spams is called .....................................
8. .................................... is the process of loading operating system in the primary memory from the boot sector.
9. .................................... is an example of a spyware.
Cyber Safety 71

