Page 20 - Computer Genius Class 06
P. 20
3. Which type of cyber crime is referred to sending of bulk mail by an identified or unidentified source?
(i) Hacking (ii) Spamming
(iii) Phishing i one o these
4. Online ____________ fraud refers to the illegal withdrawing or transferring of money from one bank
account to another by a cybercriminal.
(i) IPR (ii) citation
(iii) transaction i oth i and ii
. hich o the ollo ing is a type o anti irus
(i) Worm (ii) Norton
(iii) Trojan i one o these
6. Which malware spreads through spam emails to steal banking information?
(i) Emotet (ii) Pegasus
(iii) Wabbit i torm
B. Fill in the blanks using the words given below.
iometric is leanup al are ass ord Retina biometrics
1. Malacious software is known as .
2. Recognition of biological characteristics is an example of authentication.
3. scans your computer for temporary files and other files that can be deleted.
4. shoots an infrared light beam into eye that has been placed close to the signal
recei er.
5. A is a ord or collection o characters used or user authentication to pro e the
identity.
C. State whether these statements are true or false.
1. irus cannot replicate itsel .
2. is a mal are program.
. orm does not need any program to acti ate it.
4. We should scan our computer regularly.
5. Downloading from a non-secured website can cause harm to your computer.
D. Answer the following questions:
1. What is meant by authentication? What are the types of authentication?
2. o does a irus in ect a computer
18 Computer Genius-VI

