Page 122 - Trackpad_ipro 4.1_Class6
P. 122
3. Which of the following is not a communication service on the Internet?
a. Chat b. E-mail
c. Google Drive d. VoIP
4. What is used to store and manage data on a remote server in place of a local computer?
a. Blogs b. Data Diddling
c. E-mail d. Cloud storage
5. What is the process of stealing personal information, changing financial data, and breaking
security systems to gain unauthorised access to computer systems called?
a. Cracking b. Hacking
c. Chatting d. Blogging
B. Write ‘T’ for true and ‘F’ for false.
1. Avoid using pirated copies of software. ..........................
2. Facebook is an example of an e-mail service provider. ..........................
3. No one keeps a check on the comments of participants on the newsgroup. ..........................
4. Cyber threat is a criminal activity in which computers are used
to damage data, steal data, or disrupt digital life of a person. ..........................
5. Chatting refers to a communication in the form of small messages
among the computers over the Internet. ..........................
C. Fill in the blanks using the words given below:
Hints
Chat, Carding, E-greeting, Cyber security
1. …..…………… refers to the process of stealing credit card numbers online.
2. An …..…………… is just like a paper greeting card.
3. …..…………… is a conversation that takes place in a friendly atmosphere.
4. The process of protecting computer resources such as networks, devices, programs, and
data from unauthorised access, damage, or attack is called …..…………….
Let's Do It Section B (Subjective)
A. Short answer type questions.
1. What is Phreaking?
....................................................................................................................................................................................
....................................................................................................................................................................................
120 iPro (Ver. 4.1)-VI

