Page 50 - TP-Play_V-2.0_Book-6
P. 50

In general computer terms, we call them as white hats, black hats and grey hats. Hackers,
               who are out to steal personal information, change an organization’s financial data, break
               security codes to gain unauthorized network access, or conduct other destructive activities
               are sometimes called “crackers.”
                 Cracking: Software cracking is considered illegal and cracked software is often called pirated
               software. A cracker get into all kinds of mischief, including breaking or “cracking” copy protection
               on software programs, breaking into systems and causing harm, changing data, or stealing.
               Recap



                   Some of the popular e-mail service providers are Gmail, Yahoo Mail, etc.
                   The technique of watching the person while talking to him is called video conferencing.
                    Online chat refers to a communication in the form of small messages among the
                   computers over the Internet, just like SMS service on mobiles.
                   The most common and popular VoIP services used in India are Skype and GoogleTalk.
                    Blogs are generally like a detailed explanation on a subject or sometimes also as a
                   Diary of Events.
                    Cloud storage is a service where the users are able to store and manage data on
                   remote server in place of their local computer.
                    The process of protecting computer resources such as networks, devices, programs,
                   and data from unauthorised access, damage, or attack is called cyber security.
                   Cyber crime is a criminal activity in which computers are used to do crime.



                                                   Exercise



            A.  Tick ( ) the correct option.
               1.  Which of the following is not a cloud storage?

                  a.  Google Drive                                 b.  Smart Drive

                  c.  Dropbox                                      d.  None of these

               2.  What is the technique of watching the person while talking to him called?

                  a.  Video conferencing                           b.  E-mail

                  c.  Blog                                         d.  Both a. and b.
               3.  Which of these is not a communication service of Internet?

                  a.  Chat                                         b.  Blog

                  c.  E-mail                                       d.  Video conferencing

               4.  .......................... crime is a criminal activity in which computers are used to do crime.

                  a.  Cyber                                        b.  Organised

                  c.  Property                                     d.  None of these



             50       Play (Ver. 2.0)-VI
   45   46   47   48   49   50   51   52   53   54   55