Page 118 - iPrime_V2.2_class6
P. 118
OneOne Touch Learn Section A (Objective)
A. Tick ( ) the correct option.
1. .......................... is not a cloud storage.
a. Google Drive c. OneDrive
b. Dropbox d. Hard Disk
2. The technique of watching the person while talking to him is called .......................... .
a. Video conferencing c. Cracking
b. E-mail d. Chatting
3. .......................... is not a communication service of the Internet.
a. Chat c. Google Drive
b. E-mail d. VoIP
4. .......................... is used to store and manage data on a remote server in place of their local
computer.
a. Blogs c. E-mail
b. Data Diddling d. Cloud storage
5. The process of stealing personal information, changing financial data, and breaking
security systems to gain unauthorised access to computer systems is called ...................... .
a. Cracking c. Chatting
b. Hacking d. Blogging
B. Write ‘T’ for true and ‘F’ for false.
1. Avoid using pirated copies of software. ..........................
2. Facebook is an example of an e-mail service provider. ..........................
3. No one keeps a check on the comments of participants on the newsgroup. ..........................
4. Cyber threat is a criminal activity in which computers are used to damage
data, steal data, or disrupt digital life of a person. ..........................
5. Chatting refers to a communication in the form of small messages
among the computers over the Internet. ..........................
C. Fill in the blanks using the words given below:
Hints
Chat, Carding, E-greeting, cyber security
1. …..…………… refers to the process of stealing credit card numbers online.
116 iPRIME (Ver. 2.2)–VI

