Page 84 - IT_V5.0_Class6
P. 84
Tech Trivia Section A (Objective)
A. Tick ( ) the correct option.
1. Which of the following is an example of a WAN?
a. Home Wi-Fi b. Corporate Office LAN
c. The Internet d. Bluetooth
2. What is a device used to prevent unauthorised access to a network is called?
a. Antivirus b. Firewall
c. Router d. Spam Filter
3. What are spam messages typically used for?
a. Promote legitimate businesses b. Harm users with malicious links
c. Enhance network speed d. Reduce malware
4. What is the unique identifier for devices on a network is called?
a. URL b. Web Browser
c. IP Address d. Cloud
5. What do phishing scams often trick people into?
a. Upgrading their software b. Revealing sensitive information
c. Downloading legitimate apps d. Browsing safely
B. Fill in the blanks using the words given below:
Firewall, URL, Phishing, Cyberstalking, VPN
1. A secure connection over an untrusted network is provided by a ..................................
2. A ................................. monitors and controls incoming and outgoing network traffic.
3. A ................................. is the address used to access websites on the Internet.
4. ................................. attempts to trick users into revealing sensitive information.
5. ................................. involves using the Internet to harass someone persistently.
C. Write ‘T’ for true and ‘F’ for false.
1. Spam emails are always harmless. ....................
2. The Indian IT Act 2000 does not cover digital signatures. ....................
82 Information Technology (V5.0)-VI

