Page 99 - IT_V5.0_Class7
P. 99
A computer network is a group of connected computers and devices that allow people
to easily communicate and share files, software, resources, and information.
A PAN is a network that connects devices within the personal range of an individual,
such as smartphones, tablets, laptops, and wearable devices.
Internet is a global network that connects computers to share information.
An app is a program designed to perform a specific task like games, Internet banking,
online buying and selling products, etc.
Web page is a single document or page within a website, containing text, images,
multimedia, or other types of content.
In IP address is a unique number that identifies a computer on a network. It helps locate
the device on the Internet.
Spam is an unwanted or junk message sent in bulk, usually via email, but it can also
appear through instant messaging, social media, text messages (SMS), and forums.
Malware, or malicious software, is designed to damage computer systems or networks.
Virus is a harmful software attached to a file.
A computer worm is a type of malicious program that replicates on its own and can
easily spread to other computers through the network.
A Trojan Horse is a type of malware that enters your computer as a hidden program
attached to a harmless file.
Antivirus software is a program designed to prevent, detect, and remove malicious
programs from the computer.
A firewall can be hardware or software that controls network traffic in a private network.
Cybercrime is defined as the crime committed using a computer and the Internet.
Cyber Law refers to the legal rules or laws that govern the digital world.
Tech Trivia Section A (Objective)
A. Tick ( ) the correct option.
1. .............................. is a network security device or a software that filters the network traffic
within a private network.
a. Firewall b. Antivirus
c. Spam c. Virus
2. What is the primary goal of computer networking?
a. To develop new software programs
b. To share resources such as printers and scanners
c. To play online games
d. To encourage ethical hacking
Cyber Security 97

