Page 64 - PlusGPT_V2.1_C7_Flipbook
P. 64
test Your skiLLs
1. Tick ( ) the correct option.
a. A Digital Footprint is also known as .
(i) Digital Diary (ii) Digital Dossier
(iii) Database (iv) None of the above
b. Why do hackers break into the other’s computer system?
(i) To steal important data (ii) To destroy the system
(iii) Both (i) and (ii) (iv) None of these
c. When the electronic devices are used to harass or embarrass other person then it is called as
.
(i) Hacking (ii) Spamming
(iii) Cyberbullying (iv) Social Networking
d. are virtual diaries created by people to share their hobbies, thoughts with
like-minded people.
(i) E-learning (ii) Blog
(iii) E mail (iv) Vlog
e. When someone sends e-mails that appear genuine from a trusted e-mail ID but in reality they're
not to be trusted. It is called .
(i) Spamming (ii) E-mail spoofing
(iii) Phishing (iv) Hacking
2. Fill in the blanks using the words given below:
Network, Spamming, Hacking, Transaction, Patent
a. Internet is a of interconnected computers.
b. refers to the sending of bulk mail by an identified or unidentified source.
c. Some hackers use hacking for national security, creating safer systems, etc. This is known as
.
d. Online fraud refers to the illegal withdrawing or transferring of money from
one bank account to another by a cybercriminal.
e. is the right that gives an inventor the complete right to make, use, and sell
his or her work for a specific time period.
62 Premium Edition-VII

