Page 95 - TP-Play_V-2.0_Book-8
P. 95

Password  protection,  face  recognition,  voice recognition  are  some important
                    techniques for computer safety.
                     Malware is designed to damage or do unwanted actions on a computer system.
                     A set of programs that identify and remove malware are known as antivirus software.

                     A firewall is a type of security program or hardware that prevents unauthorised access
                    to a computer network.



                                                   Exercise




            A.  Tick ( ) the correct option.

                1.  Norton is a/an ......................

                   a.  System Software                             b.  Operating System
                   c.  Antivirus                                   d.  All of these

                2.  You can backup your data into ......................

                   a.  UPS                                         b.  External Hard Drive
                   c.  Mouse                                       d.  None of these

                3.  ..................... is a type of malware.

                   a.  Encryption                                  b.  Trojan Horse

                   c.  AVG                                         d.  None of these

            B.  Fill in the blanks using the words given below.


                                         biometric, malware, encryption, decryption, zombie



                1.  Malacious software is known as ............................

                2.  Recognition of biological characteristics is an example of ........................... authentication.

                3.  ........................... is the process of converting encrypted data into a readable form.

                4.  Decryption is the opposite of ............................

                5.  ........................... works in a similar way as the spyware.

            C.  Short answer type questions:

                1.  What is meant by authentication? What are the types of authentication?

                   ...................................................................................................................................................................................................



                                                                          Computer Safety and Security       95
   90   91   92   93   94   95   96   97   98   99   100