Page 19 - ThinkGPT_V2.1_C6_Flipbook
P. 19

Norton               Quick Heal               AVG                  McAfee



                       REFRESH

                       Cyber crimes are offences that are committed using computers and smart devices connected through
                      the Internet.
                       Authentication is the process of verifying a user’s identity before granting him or her access to a
                      computer system.
                       Password protection, face recognition, voice recognition are some important techniques for computer
                      safety.
                       Malware, or malicious software, is a software made to cause harm to your system.
                       The different types of malware are worm, trojan horse, spyware, ramsomware and rootkit.
                       A computer virus is a program that is able to copy itself when it is run.
                       A set of programs that identify and remove malware is known as antivirus software.







                                                  TeCh Ready




                 A.  Tick ( ) the correct option.

                    1.   ____________ refers to the use of Internet, e-mail, and instant messaging to harass, demean,
                        embarrass or intimidate someone.

                         (i)   Hacking                                    (ii)   Spamming

                        (iii)   Cyberbullying                            (iv)   Social Networking
                    2.  Which of the following statements is incorrect in context of Plagiarism?

                         (i)  We can copy the content written by someone without his permission.

                        (ii)   We can copy the content written by someone by taking his permission.

                        (iii)   We can copy the content written by someone by giving citation.
                        (iv)   We need to rephrase the content after copying.




                                                                                Safeguarding your Computer     17
   14   15   16   17   18   19   20   21   22   23   24