Page 85 - IT_V5.0_Class6
P. 85

3.  Strong passwords can help protect personal data online.                           ....................

                     4.  Worms require a host program to spread.                                           ....................

                     5.  Cyberbullying can occur through emails.                                           ....................



                     Answer Arcade                                                            Section B (Subjective)



                 A.  Short answer type questions.

                     1.  What is a network?
                        ...................................................................................................................................................................................

                        ...................................................................................................................................................................................

                     2.  Name two types of malwares.
                        ...................................................................................................................................................................................

                        ...................................................................................................................................................................................

                     3.  What is phishing?
                        ...................................................................................................................................................................................

                     4.  What is the purpose of a firewall?

                        ...................................................................................................................................................................................
                        ...................................................................................................................................................................................

                     5.  Define netiquette.

                        ...................................................................................................................................................................................
                        ...................................................................................................................................................................................

                 B.  Long answer type questions.

                     1.  Explain different types of networks with examples.
                        ...................................................................................................................................................................................

                        ...................................................................................................................................................................................

                        ...................................................................................................................................................................................
                        ...................................................................................................................................................................................

                     2.  What is malware? Explain its types with examples.

                        ...................................................................................................................................................................................
                        ...................................................................................................................................................................................

                        ...................................................................................................................................................................................

                        ...................................................................................................................................................................................




                                                                                                Cyber Security   83
   80   81   82   83   84   85   86   87   88   89   90