Page 102 - IT_V5.0_Class7
P. 102

...................................................................................................................................................................................

                         ...................................................................................................................................................................................
                      3.  What is Ethical hacking? Explain its different types.

                         ...................................................................................................................................................................................
                         ...................................................................................................................................................................................

                         ...................................................................................................................................................................................
                         ...................................................................................................................................................................................

                      4.  Why do we need an antivirus?
                         ...................................................................................................................................................................................

                         ...................................................................................................................................................................................
                         ...................................................................................................................................................................................

                         ...................................................................................................................................................................................

                                                                                    #Critical Thinking
                  C.  Competency-based/Application-based questions.                 #Technology Literacy

                      1.  Vedika’s new marketing firm needs to connect computers in different departments within
                         the same building for efficient communication and resource sharing. What type of network
                         should she recommend?
                      2.  Samira receives multiple unsolicited emails every day that clutter her inbox with unwanted
                         advertisements and promotions. What is this type of email called?


                      Code Clues                                                    #Critical Thinking



                  Find eight terms related to Internet and Cyber Security in the given grid.

                                            L    B   D M     B    I   X   T   Y   H   H    P
                                            T    I   E   R   A W      L   A   M W     H    G

                                            W    E   Y   F   O   Y    I   A   L   D    J  M

                                            U M      N   I   S   E    V   U   S   H   G    G
                                            L    I   F   R   Q   X    V   J   R   M   N    Y

                                            R   R    A   E   E   W    V   L   F   D    I   G

                                            N   C    I   W   C   T   O M      S   U   H    U
                                            O   R    D   A   F    L  N    R   I   G    S   V

                                            V    E   P   L   R   M    I   I   M O      I   Q

                                             J   B   G   L   N   H    B   Q   O   N   H    R
                                             I   Y   F   H   Q   V    I   R   U   S    P   P

                                            H   C    K   Y   N   E    T  W    O   R    K   F



                   100    Information Technology (V5.0)-VII
   97   98   99   100   101   102   103   104   105   106