Page 74 - TechPluse_C8_Flipbook
P. 74

Checkpoint




                  A.    Tick ( ) the correct option.
                             ü
                        1.   Which of the following is not a cloud storage service provider?

                             a.   Google Drive                           c.  SkyDrive
                             b.  Dropbox                                 d.  None of these

                        2.   The technique of watching the person while talking to him is called ............................ .

                             a.  Video conferencing                      c.  Both a and b
                             b.   E-mail                                 d.  E-banking

                        3.   Which of the following is not a communication service of Internet?

                             a.  Chat                                    c.  Google Drive

                             b.  E-mail                                  d.  VoIP

                        4.   Which one of these is used to store and manage data on remote server in place of
                             their local computer?

                             a.  Blogs                                   c.  E-mail
                             b.   Data Diddling                          d.  Cloud storage

                        5.   The process or stealing personal information, changing financial data, breaking security
                             systems to gain unauthorised access of computer systems is called ............................ .

                             a.  Cracking                                c.  Chatting

                             b.  Hacking                                 d.  None of these

                  B.    Fill in the blanks using the words given below:


                                                 Hints

                                                   Chat, Carding, E-greeting, Cyber Security



                        1.   ...................... refers to process of stealing credit card numbers online.


                        2.   An ...................... is just like a paper greeting card.

                        3.   ...................... is a conversation that takes place in a friendly atmosphere.

                        4.   The process of protecting computer resources such as networks, devices, programs, and data

                             from unauthorised access, damage, or attack is called ...................... .





               72       Premium Edition-VIII
   69   70   71   72   73   74   75   76   77   78   79