Page 102 - IT_V5.0_Class7
P. 102
...................................................................................................................................................................................
...................................................................................................................................................................................
3. What is Ethical hacking? Explain its different types.
...................................................................................................................................................................................
...................................................................................................................................................................................
...................................................................................................................................................................................
...................................................................................................................................................................................
4. Why do we need an antivirus?
...................................................................................................................................................................................
...................................................................................................................................................................................
...................................................................................................................................................................................
...................................................................................................................................................................................
#Critical Thinking
C. Competency-based/Application-based questions. #Technology Literacy
1. Vedika’s new marketing firm needs to connect computers in different departments within
the same building for efficient communication and resource sharing. What type of network
should she recommend?
2. Samira receives multiple unsolicited emails every day that clutter her inbox with unwanted
advertisements and promotions. What is this type of email called?
Code Clues #Critical Thinking
Find eight terms related to Internet and Cyber Security in the given grid.
L B D M B I X T Y H H P
T I E R A W L A M W H G
W E Y F O Y I A L D J M
U M N I S E V U S H G G
L I F R Q X V J R M N Y
R R A E E W V L F D I G
N C I W C T O M S U H U
O R D A F L N R I G S V
V E P L R M I I M O I Q
J B G L N H B Q O N H R
I Y F H Q V I R U S P P
H C K Y N E T W O R K F
100 Information Technology (V5.0)-VII

