Page 544 - ComputerScience_Class_11
P. 544
2. What type of attack is this email most likely an example of?
a. Social Engineering b. Ransomware
c. Spyware d. Phishing
3. What can the company do to protect itself from future phishing attempts?
a. Disable Emails b. Use Anti-Phishing Software
c. Ignore Emails d. Conduct Awareness Training
Answers
1. a 2. d 3. b
Unsolved Questions
A. Tick ( ) the correct option.
1. Which programming language is widely used for Artificial Intelligence today?
a. Python b. Java
c. C# d. Ruby
2. Which device is used to experience virtual reality?
a. Smartphone b. VR headset
c. Smartwatch d. Tablet
3. What does IoT stand for?
a. Internet of Time b. Internet of Things
c. Interface of Technology d. Internet of Text
4. Which of the following is a common method to avoid phishing attacks?
a. Using strong passwords b. Clicking on suspicious links
c. Ignoring warnings d. Sharing personal details
5. What is the main purpose of software piracy?
a. To share the software b. To distribute the software freely
c. To illegally copy and distribute software d. To update software
B. Fill in the blanks.
1. The most common malware types include ………………… and worms.
2. ………………… is the process of sending unsolicited emails for commercial purposes.
3. Artificial Intelligence allows computers to ………………… from past experiences.
4. A ………………… is a malicious software that disguises itself as a legitimate program.
5. ………………… refers to the violation of privacy through unauthorised access to someone’s personal data.
C. Answer the following questions:
1. What is phishing and how does it work?
2. How does AI help in the development of smart cities?
3. What is the purpose of IoT in healthcare?
4. Define intellectual property rights.
5. How does VR benefit medical training?
6. Explain how IoT is used in smart homes.
7. Discuss the ethical implications of augmented reality in education.
8. How does phishing use social engineering to deceive people?
542 Touchpad Computer Science (Ver. 3.0)-XI

