Page 74 - TechPluse_C8_Flipbook
P. 74
Checkpoint
A. Tick ( ) the correct option.
ü
1. Which of the following is not a cloud storage service provider?
a. Google Drive c. SkyDrive
b. Dropbox d. None of these
2. The technique of watching the person while talking to him is called ............................ .
a. Video conferencing c. Both a and b
b. E-mail d. E-banking
3. Which of the following is not a communication service of Internet?
a. Chat c. Google Drive
b. E-mail d. VoIP
4. Which one of these is used to store and manage data on remote server in place of
their local computer?
a. Blogs c. E-mail
b. Data Diddling d. Cloud storage
5. The process or stealing personal information, changing financial data, breaking security
systems to gain unauthorised access of computer systems is called ............................ .
a. Cracking c. Chatting
b. Hacking d. None of these
B. Fill in the blanks using the words given below:
Hints
Chat, Carding, E-greeting, Cyber Security
1. ...................... refers to process of stealing credit card numbers online.
2. An ...................... is just like a paper greeting card.
3. ...................... is a conversation that takes place in a friendly atmosphere.
4. The process of protecting computer resources such as networks, devices, programs, and data
from unauthorised access, damage, or attack is called ...................... .
72 Premium Edition-VIII

