Page 20 - CG_v2.1_flipBooks_class_6
P. 20

3.   Which type of cyber crime is referred to sending of bulk mail by an identified or unidentified source?
                          (i)  Hacking                                     (ii)  Spamming

                         (iii)  Phishing                                   (iv)  None of these

                      4.   Online ____________ fraud refers to the illegal withdrawing or transferring of money from one bank
                         account to another by a cybercriminal.
                          (i)  IPR                                         (ii)  citation

                         (iii)  transaction                                (iv)  both (i) and (ii)
                      5.  Which of the following is a type of antivirus?

                          (i)  Worm                                        (ii)  Norton

                         (iii)  Trojan                                     (iv)  None of these
                      6.   Which malware spreads through spam emails to steal banking information?

                          (i)  Emotet                                      (ii)  Pegasus

                         (iii)  Wabbit                                     (iv)  Storm
                  B.  Fill in the blanks using the words given below.

                                  Biometric   Disk Cleanup   Malware   Password   Retina biometrics

                      1.  Malacious software is known as                  .
                      2.  Recognition of biological characteristics is an example of             authentication.
                      3.                    scans your computer for temporary files and other files that can be deleted.

                      4.                    shoots an infrared light beam into eye that has been placed close to the signal
                         receiver.

                      5.   A                  is a word or collection of characters used for user authentication to prove the
                         identity.


                  C.  State whether these statements are true or false.
                      1.  A virus cannot replicate itself.
                      2.  AVG is a malware program.

                      3.  A worm does not need any program to activate it.
                      4.  We should scan our computer regularly.
                      5.   Downloading from a non-secured website can cause harm to your computer.

                  D.  Answer the following questions:
                      1.  What is meant by authentication? What are the types of authentication?





                      2.  How does a virus infect a computer?








                       18    Computer Genius (V2.1)-VI
   15   16   17   18   19   20   21   22   23   24   25