Page 19 - CG_v2.1_flipBooks_class_6
P. 19

Norton               Quick Heal               AVG                  McAfee


                       Let's REFRESH


                       Computer safety refers to the protection of computer-based resources against unauthorised use or
                      physical damage.
                       Authentication is the process of verifying a user’s identity before granting him or her access to a
                      computer system.
                       Password protection, face recognition, voice recognition are some important techniques for computer
                      safety.
                       A computer virus is a ‘piece of code’ or 'program' developed to corrupt the data or program files
                      stored on the computer system.
                       A malware is a type of malicious program designed to damage or carryout other unwanted actions on
                      a computer system.
                       The different types of malware are worm, trojan horse, spyware, ramsomware and rootkit.
                       A set of programs that identify and remove malware is known as antivirus software.




                                                       EXERCISE





                 A.  Tick ( ) the correct option.

                    1.   When the electronic devices are used to harass or embarrass other person then it is called
                        as ____________ .

                         (i)   Hacking                                    (ii)   Spamming

                        (iii)   Cyberbullying                            (iv)   Social Networking
                    2.  Which of the following statements is incorrect in context of Plagiarism?

                         (i)  We can copy the content written by someone without his permission.

                        (ii)   We can copy the content written by someone by taking his permission.

                        (iii)   We can copy the content written by someone by giving citation.
                        (iv)   We need to rephrase the content after copying.



                                                                                Safeguarding Your Computer     17
   14   15   16   17   18   19   20   21   22   23   24