Page 19 - ThinkGPT_V2.1_C6_Flipbook
P. 19
Norton Quick Heal AVG McAfee
REFRESH
Cyber crimes are offences that are committed using computers and smart devices connected through
the Internet.
Authentication is the process of verifying a user’s identity before granting him or her access to a
computer system.
Password protection, face recognition, voice recognition are some important techniques for computer
safety.
Malware, or malicious software, is a software made to cause harm to your system.
The different types of malware are worm, trojan horse, spyware, ramsomware and rootkit.
A computer virus is a program that is able to copy itself when it is run.
A set of programs that identify and remove malware is known as antivirus software.
TeCh Ready
A. Tick ( ) the correct option.
1. ____________ refers to the use of Internet, e-mail, and instant messaging to harass, demean,
embarrass or intimidate someone.
(i) Hacking (ii) Spamming
(iii) Cyberbullying (iv) Social Networking
2. Which of the following statements is incorrect in context of Plagiarism?
(i) We can copy the content written by someone without his permission.
(ii) We can copy the content written by someone by taking his permission.
(iii) We can copy the content written by someone by giving citation.
(iv) We need to rephrase the content after copying.
Safeguarding your Computer 17

