Page 73 - CA 165 ver 1.0 Class 9
P. 73

Unsolved Exercise


                                                                PART A
                 A.  Very short answer type questions.
                     1.   Which software or hardware helps in keeping a network secure?
                     2.     What can be a combination of alphabet, numbers and special characters that can be used to protect our
                         valuable content?

                     3.     What term can be used when Internet and other types of electronic communications is used to harass or
                         threaten other people?

                     4.   Name four common types of malware.
                     5.     Which software is used to safeguard or prevent the computer from virus and for cleaning the unwanted
                         programs?
                     6.   Give one example of popular antivirus.
                 B.  Case Based MCQs
                       Privacy in Information Technology refers to personal control over one’s own files and documents. It also refers
                     to the right and ability to keep control over the information that one reveals or uploads over the internet and
                     to have a control over the selection of viewers or users who can access that information.
                     1.   When visiting sites where you win something or they are giving something away, you will ...............................

                         i.  give your name, phone number, and address       ii.  give parents information
                         iii.  give no personal information                  iv.  give whatever information they request
                     2.     You are online and you get an instant message from your internet service provider needing your password
                         .....................................
                         i.  I give it to them because they are my ISP       ii.  I ask them why they need it
                         iii.  I never give my password to anyone            iv.  I log off without giving any information

                     3.   What is the private browsing mode in Internet Explorer/Edge called?
                         i.  InPrivate                                       ii.  Incognito
                         iii.  PrivateIn                                     iv.  All of these

                 C.   Fill in the blanks.

                     1.   The .................................... is the most significant innovation of mankind.
                     2.     .................................... and .................................... programs offer real-time protection and restrict the computer
                         from getting affected by malwares.
                     3.   .................................... are the programs that are created on the local computer when you visit the website.
                     4.     .................................... should be combination of alphabet, numbers and special characters so that it is not
                         easy to be cracked by others.
                     5.   .................................... in Information Technology refers to personal control over one’s files and documents.
                     6.     .................................... is the national nodal agency for responding to incidents related to computer security
                         incidents.

                     7.   The one who sends spams is called .....................................
                     8.   .................................... is the process of loading operating system in the primary memory from the boot sector.
                     9.   .................................... is an example of a spyware.



                                                                                                 Cyber Safety    71
   68   69   70   71   72   73   74   75   76   77   78