Page 116 - IT_V5.0_Class8
P. 116
D. Write ‘T’ for true and ‘F’ for false.
1. Electronic mail is sending and receiving messages over the Internet. ....................
2. Internet is expressed in terms of bits per second (bps). ....................
3. Going online means disconnecting your device to the Internet. ....................
4. Metropolitan Area Network is when the computers are interconnected
within the same city. ....................
5. Spam messages are always harmless and should be opened. ....................
6. Data protection is safeguarding your data from data damage or data access
by unauthorised people. ....................
7. WAN connects LANs across small geographical areas. ....................
8. Email is not a common application of the Internet. ....................
Answer Arcade Section B (Subjective)
A. Short answer type questions.
1. What is Pan?
...................................................................................................................................................................................
2. What is WWW?
...................................................................................................................................................................................
...................................................................................................................................................................................
3. Write steps how to avoid getting spam messages.
...................................................................................................................................................................................
...................................................................................................................................................................................
4. What is phishing?
...................................................................................................................................................................................
...................................................................................................................................................................................
5. What is cyberbullying?
...................................................................................................................................................................................
...................................................................................................................................................................................
6. Write any two types of cybercrime.
...................................................................................................................................................................................
...................................................................................................................................................................................
7. What is Trojan Horse? Give an example.
...................................................................................................................................................................................
...................................................................................................................................................................................
114 Information Technology (V5.0)-VIII

