Page 122 - Trackpad_ipro 4.1_Class6
P. 122

3.  Which of the following is not a communication service on the Internet?

                         a.  Chat                                        b.  E-mail
                         c.  Google Drive                                  d.  VoIP

                     4.  What is used to store and manage data on a remote server in place of a local computer?
                         a.  Blogs                                       b.  Data Diddling

                         c.  E-mail                                      d.  Cloud storage
                     5.  What is the process of stealing personal information, changing financial data, and breaking
                         security systems to gain unauthorised access to computer systems called?

                         a.  Cracking                                    b.  Hacking

                         c.  Chatting                                    d.  Blogging
                  B.  Write ‘T’ for true and ‘F’ for false.

                     1.  Avoid using pirated copies of software.                                         ..........................
                     2.  Facebook is an example of an e-mail service provider.                           ..........................

                     3.   No one keeps a check on the comments of participants on the newsgroup.  ..........................
                     4.   Cyber threat is a criminal activity in which computers are used
                        to damage data, steal data, or disrupt digital life of a person.                 ..........................

                     5.   Chatting refers to a communication in the form of small messages
                        among the computers over the Internet.                                           ..........................

                  C.  Fill in the blanks using the words given below:
                                               Hints


                                                  Chat, Carding, E-greeting, Cyber security

                     1.  …..…………… refers to the process of stealing credit card numbers online.

                     2.  An …..…………… is just like a paper greeting card.
                     3.  …..…………… is a conversation that takes place in a friendly atmosphere.

                     4.   The process of protecting computer resources such as networks, devices, programs, and
                         data from unauthorised access, damage, or attack is called …..…………….




                   Let's Do            It                                                    Section B (Subjective)



                  A.  Short answer type questions.
                     1.  What is Phreaking?

                         ....................................................................................................................................................................................

                         ....................................................................................................................................................................................




                   120     iPro (Ver. 4.1)-VI
   117   118   119   120   121   122   123   124   125   126   127