Page 84 - PlusGPT_V2.1_C1_Flipbook
P. 84

test Your skiLLs





                  1.  Tick ( ) the correct option.

                     a.  A Digital Footprint is also known as                    .
                        (i)  Digital Diary                               (ii)   Digital Dossier

                       (iii)  Database                                  (iv)   Cyber Shadow
                     b.  Why do hackers break into the other’s computer system?

                        (i)  To steal important data                     (ii)   To destroy the system
                       (iii)  Both (i) and (ii)                         (iv)   None of these

                     c.    When the electronic devices are used to harass or embarrass other person then it is called as
                                              .

                        (i)  Hacking                                     (ii)   Spamming
                       (iii)  Cyberbullying                             (iv)   Social Networking

                     d.  What is misuse of data and resources available online called?
                        (i)  Cyber safety                                (ii)  Cyber crime

                       (iii)  Both (i) and (ii)                         (iv)  None of these
                     e.  Which of the following is/are the types of online transaction fraud?

                        (i)  Identify Theft                              (ii)  Job Frauds
                       (iii)  Banking Frauds                            (iv)  All of these

                     f.                       refers to the act of breaking into systems to steal or destroy data.
                        (i)  Hacking                                     (ii)  Cracking

                       (iii)  Banking Frauds                            (iv)  None of these

                  2.  Fill in the blanks using the words given below:


                                        Network, Spamming, Hacking, Transaction, Cyber safety


                      a.  Internet is a _______________ of interconnected computers.

                      b.  _______________ refers to the sending of bulk mail by an identified or unidentified source.

                      c.    Some hackers use hacking for national security, creating safer systems, etc. This is known as
                         _______________ .

                      d.    Online _______________ fraud refers to the illegal withdrawing or transferring of money from
                         one bank account to another by a cybercriminal.


                      e.    _______________ is a measure to prevent oneself from cyber crimes or cyber attacks.



                  82    Premium Edition-VI
   79   80   81   82   83   84   85   86   87   88   89