Page 111 - iPlus_Ver_2.0_class_6
P. 111

Exercise


                                                        Section A (Objective)
                 A.  Tick (✓) the correct option.
                    1.  Which of the following is not a cloud storage service provider?

                       a. Google Drive                                  b. Dropbox

                       c. Instagram                                     d. None of these
                    2.  What is the live meeting held between two or more geographically separated people known as?
                       a. Video conferencing                            b. E-mail


                       c. Both a and b                                  d. E-banking
                    3. Which of the following is not a communication service on the Internet?
                       a. Chat                                          b. E-mail


                       c. Google Drive                                  d. VoIP
                    4.  What is used to store and manage data on a remote server in place of a local computer?
                       a. Blogs                                         b. Data Diddling


                       c. E-mail                                        d. Cloud storage
                    5.   Name the process of stealing personal information, changing financial data, and breaking security
                       systems to gain unauthorised access to computer systems.
                       a. Cracking                                      b. Hacking

                       c. Chatting                                      d. None of these

                 B.  Fill in the blanks using the words given below.

                                       Hints: newsgroup, data diddling, e-greeting, cybersecurity

                    1.  The …..…………… refers to the process of changing the data going into or out of a computer.

                    2.  A/An …..…………… is just like a paper greeting card.
                    3.  In online community, …..…………… is the title given to a discussion group.

                    4.   The process of protecting computer resources such as networks, devices, programs, and data from
                       unauthorised access, damage, or attack is called …..…………… .

                 C.  Write ‘T’ for true and ‘F’ for false.

                    1.  Avoid using pirated copies of software.                                          ..........................
                    2.  Facebook is an example of social networking service.                             ..........................

                    3.   No one keeps a check on the comments of participants on the newsgroup.          ..........................
                    4.   Cyber threat is a criminal activity in which computers are used
                       to damage data, steal data, or disrupt digital life of a person.                  ..........................
                    5.   Chatting refers to a communication in the form of small messages
                       among the computers over the Internet.                                            ..........................


                                                                                                                 109
                                                                                 Online Surfing and Cybersecurity
   106   107   108   109   110   111   112   113   114   115   116