Page 106 - TP_Play_V2.1_class8
P. 106

Password  protection,  face  recognition,  voice recognition  are  some important
                          techniques for computer safety.
                           Malware is designed to damage or do unwanted actions on a computer system.

                           A set of programs that identify and remove malware are known as antivirus software.
                           A firewall is a type of security program or hardware that prevents unauthorised access
                          to a computer network.






                                                         Exercise




                  A.  Tick ( ) the correct option.

                      1.  Norton is a/an ......................

                         a.  System Software                             b.  Operating System

                         c.  Antivirus                                   d.  Device Driver

                      2.  You can backup your data into ......................
                         a.  UPS                                         b.  External Hard Drive

                         c.  Mouse                                       d.  Web Server

                      3.  Which of the following is a type of malware?

                         a.  Encryption                                  b.  Trojan Horse

                         c.  AVG                                         d.  None of these


                  B.  Fill in the blanks using the words given below:


                                                biometric, malware, antivirus, decryption, zombie



                      1.  Malicious software is also known as ............................

                      2.  The identification of biological characteristics serves as an example of ........................... authentication.


                      3.  ........................... is the process of converting encrypted data into a readable form.

                      4.  An ........................... program is software designed to detect the presence of a virus on a computer
                         and remove it.


                      5.  ........................... works in a similar manner as the spyware.




                  104       Play (Ver. 2.1)-VIII
   101   102   103   104   105   106   107   108   109   110   111