Page 96 - trackpad v5.1 class 5 flipbook
P. 96

f.  Which of the following types of malware primarily infects executable files?
                           (i)  Boot Sector Virus                             (ii)  Macro Virus

                         (iii)  E-mail Virus                                 (iv)  Program File Virus

                  2.  Fill in the blanks using the words from the help box.

                           Norton, Malware, Attachments, Carbon, Signing out, Compose, Domain


                      a.  An e-mail address consists of a username and a _______________ name.
                      b.  The ‘Bcc’ field in an e-mail stands for Blind _______________ Copy.

                      c.  The _______________ option allows users to create a new e-mail message.
                      d.   E-mails can contain files such as documents, audio, videos, and pictures as
                         _______________.

                      e.  _______________ from an e-mail account helps prevent others from accessing it.
                      f.   An antivirus program scans all the files, and when an infected file is identified, it tries to
                         remove the _______________.
                      g.  _______________ antivirus is developed and distributed by Symantec Corporation.

                  3.  Answer in one or two words.

                      a.   What is one of the popular uses of the Internet?                             ____________

                      b.   Name the component of an e-mail window where all received messages
                         are displayed.                                                                 ____________

                      c.   Which component of an email window includes a brief introduction
                         about the message being sent to recipients?                                    ____________
                      d.  What should be unique for each email account?                                 ____________

                      e.   Name a virus that targets Word or Excel files.                               ____________
                      f.   What is the term for software that conceals itself inside legitimate
                         software?                                                                      ____________

                  4.  Think and answer.

                      a.  Write down any four advantages of using e-mail for communication.
                         _____________________________________________________________________________
                         _____________________________________________________________________________

                         _____________________________________________________________________________
                         _____________________________________________________________________________

                      b.  How do the uses of ‘Cc’ and ‘Bcc’ differ in an email?
                         _____________________________________________________________________________
                         _____________________________________________________________________________

                         _____________________________________________________________________________
                         _____________________________________________________________________________



                   94   Pro (V5.1)-V
   91   92   93   94   95   96   97   98   99   100   101