Page 116 - IT_V5.0_Class8
P. 116

D.  Write ‘T’ for true and ‘F’ for false.
                      1.  Electronic mail is sending and receiving messages over the Internet.              ....................

                      2.  Internet is expressed in terms of bits per second (bps).                          ....................
                      3.  Going online means disconnecting your device to the Internet.                     ....................

                      4.  Metropolitan Area Network is when the computers are interconnected
                         within the same city.                                                              ....................
                      5.  Spam messages are always harmless and should be opened.                           ....................

                      6.  Data protection is safeguarding your data from data damage or data access
                         by unauthorised people.                                                            ....................
                      7.  WAN connects LANs across small geographical areas.                                ....................
                      8.  Email is not a common application of the Internet.                                ....................



                      Answer Arcade                                                             Section B (Subjective)



                  A.  Short answer type questions.

                      1.  What is Pan?

                         ...................................................................................................................................................................................
                      2.  What is WWW?
                         ...................................................................................................................................................................................

                         ...................................................................................................................................................................................

                      3.  Write steps how to avoid getting spam messages.
                         ...................................................................................................................................................................................

                         ...................................................................................................................................................................................
                      4.  What is phishing?

                         ...................................................................................................................................................................................
                         ...................................................................................................................................................................................

                      5.  What is cyberbullying?
                         ...................................................................................................................................................................................

                         ...................................................................................................................................................................................
                      6.  Write any two types of cybercrime.

                         ...................................................................................................................................................................................

                         ...................................................................................................................................................................................
                      7.  What is Trojan Horse? Give an example.
                         ...................................................................................................................................................................................

                         ...................................................................................................................................................................................



                   114    Information Technology (V5.0)-VIII
   111   112   113   114   115   116   117   118   119   120   121