Page 78 - CA_165_V2.0_C9_Flipbook
P. 78
3. .................................... are the programs that are created on the local computer when you visit the website.
4. .................................... should be combination of alphabet, numbers and special characters so that it is not
easy to be cracked by others.
5. .................................... in Information Technology refers to personal control over one’s files and documents.
6. .................................... is the national nodal agency for responding to incidents related to computer security
incidents.
7. The one who sends spams is called .....................................
8. .................................... is the process of loading operating system in the primary memory from the boot sector.
9. .................................... is an example of a spyware.
C. Assertion and Reasoning questions.
The following questions consist of two statements – Assertion (A) and Reasoning (R). Answer these
questions by selecting the appropriate option given below:
i. Both Assertion (A) and Reason (R) are true and Reason (R) is the correct explanation of Assertion (A).
ii. Both Assertion (A) and Reason (R) are true but Reason (R) is not the correct explanation of Assertion (A).
iii. Assertion (A) is true, but Reason (R) is false.
iv. Assertion (A) is false, but Reason (R) is true.
1. Assertion (A): Two-factor authentication (2FA) enhances account security.
Reason (R): 2FA requires users to enter their username and password for login.
2. Assertion (A): Public Wi-Fi networks can pose security risks for sensitive transactions.
Reason (R): Some public Wi-Fi networks use encryption to protect data.
3. Assertion (A): Using a VPN can enhance online privacy.
Reason (R): A VPN encrypts Internet traffic and hides the user’s IP address.
4. Assertion (A): Deleting browser history removes all traces of online activity.
Reason (R): Websites and ISPs can still track users even if browser history is deleted.
SECTION B
(Subjective Type Questions)
A. Very short answer type questions.
1. Which software or hardware helps in keeping a network secure?
2. What can be a combination of alphabet, numbers and special characters that can be used to protect our
valuable content?
3. What term can be used when Internet and other types of electronic communications is used to harass or
threaten other people?
4. Name four common types of malware.
5. Which software is used to safeguard or prevent the computer from virus and for cleaning the unwanted
programs?
6. Give one example of popular antivirus.
76 Touchpad Computer Applications (Ver. 2.0)-IX

