Page 118 - iPrime_V2.2_class6
P. 118

OneOne Touch          Learn                                               Section A (Objective)



                  A.  Tick ( ) the correct option.
                     1.  .......................... is not a cloud storage.

                         a. Google Drive                                c. OneDrive

                         b. Dropbox                                     d. Hard Disk
                     2.  The technique of watching the person while talking to him is called .......................... .

                         a. Video conferencing                          c. Cracking
                         b. E-mail                                      d. Chatting

                     3.  .......................... is not a communication service of the Internet.
                         a. Chat                                        c. Google Drive

                         b. E-mail                                      d. VoIP

                     4.   .......................... is used to store and manage data on a remote server in place of their local
                         computer.

                         a. Blogs                                       c. E-mail
                         b. Data Diddling                               d. Cloud storage

                     5.   The process of stealing personal information, changing financial data, and breaking
                         security systems to gain unauthorised access to computer systems is called ...................... .

                         a. Cracking                                    c. Chatting

                         b. Hacking                                     d. Blogging
                  B.  Write ‘T’ for true and ‘F’ for false.


                     1.  Avoid using pirated copies of software.                                         ..........................
                     2.  Facebook is an example of an e-mail service provider.                           ..........................

                     3.  No one keeps a check on the comments of participants on the newsgroup.  ..........................

                     4.   Cyber threat is a criminal activity in which computers are used to damage
                         data, steal data, or disrupt digital life of a person.                          ..........................
                     5.   Chatting refers to a communication in the form of small messages
                         among the computers over the Internet.                                          ..........................

                  C.  Fill in the blanks using the words given below:
                                               Hints


                                                  Chat, Carding, E-greeting, cyber security


                     1.  …..…………… refers to the process of stealing credit card numbers online.


                 116     iPRIME (Ver. 2.2)–VI
   113   114   115   116   117   118   119   120   121   122   123