Page 88 - TP_Modular_V2.1_Class7
P. 88

Cracking: Software cracking is considered illegal and cracked software is often called pirated

                     software. A cracker gets into all kinds of mischief, including breaking or “cracking” copy protection
                     on software programs, breaking into systems and causing harm, changing or stealing data.

                     Recap



                         Some of the popular e-mail service providers are Gmail, Yahoo Mail, etc.
                         The technique of watching the person while talking to him is called video conferencing.
                          Online chat refers to a communication in the form of small messages among the
                         computers over the Internet, just like SMS service on mobiles.
                         The most common and popular VoIP services used in India are Skype and GoogleTalk.
                          Blogs are generally like a detailed explanation on a subject or sometimes also as an
                         online Diary of Events.
                          Cloud storage is a service where the users are able to store and manage data on
                         remote server in place of their local computer.
                          The process of protecting computer resources such as networks, devices, programs,
                         and data from unauthorised access, damage, or attack is called cyber security.
                         Cyber crime is a criminal activity in which computers are used to do crime.
                          Different types of E-banking are: Online Banking, Mobile Banking, ATM Banking, Direct
                         Deposit, Electronic Fund Transfer (EFT), Electronic Bill Payment and Online Investing.




                                                         Exercise



                  A.  Tick ( ) the correct option.
                     1.  Which of the following is not a cloud storage?

                        a.  Google Drive                                 b.  Smart Drive

                        c.  Dropbox                                      d.  OneDrive

                     2.  What is the technique of watching a person while talking to him called?
                        a.  Video conferencing                           b.  E-mail

                        c.  Blog                                         d.  VoIP

                     3.  Which of these is not a communication service of Internet?
                        a.  Chat                                         b.  Blog

                        c.  E-mail                                       d.  Video conferencing

                     4.  .......................... crime is a criminal activity in which computers are used to do crime.
                        a.  Cyber                                        b.  Organised

                        c.  Property                                     d.  None of these




                   86       Modular (Ver. 2.1)-VII
   83   84   85   86   87   88   89   90   91   92   93