Page 68 - KEC Khaitan C5 Flipbook
P. 68

d.  Which of the following options should you use to attach files to an e-mail?
                           (i)  Send button                                   (ii)  Inbox

                         (iii)  Attach files                                 (iv)  Drafts
                      e.  How would you classify malware in terms of its impact on computer systems?

                           (i)  Protective software                           (ii)  Harmful software

                         (iii)  Performance-enhancing software               (iv)  Creative software
                      f.  Which of the following types of malware primarily infects executable files?
                           (i)  Boot Sector Virus                             (ii)  Macro Virus

                         (iii)  E-mail Virus                                 (iv)  Program File Virus

                  2.  Fill in the blanks using the words from the help box.

                           Norton, Malware, Attachments, Carbon, Signing out, Compose, Domain

                      a.  An e-mail address consists of a username and a _______________ name.

                      b.  The ‘Bcc’ field in an e-mail stands for Blind _______________ Copy.
                      c.  The _______________ option allows users to create a new e-mail message.

                      d.   E-mails can contain files such as documents, audio, videos, and pictures as
                         _______________.
                      e.  _______________ from an e-mail account helps prevent others from accessing it.
                      f.   An antivirus program scans all the files, and when an infected file is identified, it tries to
                         remove the _______________.

                      g.  _______________ antivirus is developed and distributed by Symantec Corporation.

                  3.  Answer in one or two words.
                      a.   What is one of the popular uses of the Internet?  ___________________________________
                      b.   Name the component of an e-mail window
                         where all received messages are displayed.         ___________________________________
                      c.   Which component of an email window
                         includes a brief introduction about the
                         message being sent to recipients?                  ___________________________________

                      d.   What should be unique for each email account?  ___________________________________
                      e.   Name a virus that targets Word or Excel files.   ___________________________________
                      f.   What is the term for software that conceals
                         itself inside legitimate software?                 ___________________________________

                  4.  Think and answer.
                      a.   Akshat enjoys writing poems and wants to send them to his friend who lives in another city
                         via e-mail. Which option of e-mail can he use to do so?

                         _____________________________________________________________________________
                         _____________________________________________________________________________



                   66   Premium Edition-V
   63   64   65   66   67   68   69   70   71   72   73