Page 86 - ModularV1.1 _c6_flipbook
P. 86

4.  .......................... crime is a criminal activity in which computers are used to do the crime.

                       a. Cyber                             b. Organised                  c. Property

                  B.  Write ‘T’ for true and ‘F’ for false.
                     1.  Avoid using pirated copies of software.                                             .....................

                     2.  While blogging, your posts must not hurt feelings and reputation of others.         .....................
                     3.  No one keeps a check on the comments of participants on newsgroup.                  .....................

                     4.  The deaf, mute and hard of hearing people can communicate with
                       each other using sign languages in a video conference.                                .....................

                  C.  Fill in the blanks using the words given below.


                                                              chat, carding, blogs

                     1.  .............................. refers to the process of stealing credit card numbers online.
                     2.  .............................. are described as diary of events.
                     3.  .............................. is a conversation that takes place in a friendly atmosphere.

                  D.  Short answer type questions.

                     1.  What is Phreaking?
                        ..........................................................................................................................................................................................
                     2.  Define newsgroup.
                        ..........................................................................................................................................................................................
                     3.  What is hacking?

                        ..........................................................................................................................................................................................
                     4.  What is cloud storage?
                        ..........................................................................................................................................................................................
                  E.  Long answer type questions.
                     1.  Write the steps to upload a file on Google Drive.
                     2.  Discuss blogs in detail.

                     3.  Discuss different types of communication techniques.
                     4.  Describe the steps required to register on Skype.
                     5.  Define the types of cyber crimes.

                                                    In the lab                                         Subject Enrichment



                         Create an account on any cloud storage service and upload some files.
                        Send an e-greeting to your friend.






                  Discuss the importance of security and types of threats arising from multiple sources.



                  84      Modular (Ver. 1.1)-VII
   81   82   83   84   85   86   87   88   89   90   91