Page 73 - TechPluse_C7_Flipbook
P. 73

Checkpoint




                 A.   Tick ( ) the correct option.
                      1.  Norton is a/an .........................

                           a.  System Software                          c.  Operating System

                           b.  Antivirus                                d.  Utility Software

                      2.  You can backup your data into .........................
                           a.  UPS                                      c.  External Hard Drive

                           b.  Mouse                                    d.   Memory Card

                      3.  Which of these is an online backup service?

                           a.  Google Drive                             c.  Disk Cleanup
                           b.  Norton                                   d.  All of these

                      4.  Which of the following is a type of malware?

                           a.  Encryption                               c.  Trojan Horse
                           b.  AVG                                      d.  None of these


                 B.   Write ‘T’ for true and ‘F’ for false.

                      1.  Encrypted data can be understood easily.                                        ........................
                      2.  Computer safety refers to the protection of computer based
                           resources against unauthorised use.                                            ........................

                      3.  Antivirus is used to eradicate virus from the computer system.                  ........................

                      4.  Authentication is the process of verifying a user’s identity
                           before granting him or her access to a computer system.                        ........................
                 C.   Fill in the blanks using the words given below:

                                          Hints


                                               Biometric, Malware, Encryption, Decryption, zombie

                      1.  Malicious software is known as .........................

                      2.  Recognition of biological characters is an example of ........................ authentication.


                      3.   ........................ is the process of converting encrypted data into a readable form.

                      4.  Decryption is the opposite of .........................
                      5.   ........................ works in a similar way as the spyware.




                                                                                 Computer Safety and Security        71
   68   69   70   71   72   73   74   75   76   77   78