Page 95 - TP-Play_V-2.0_Book-8
P. 95
Password protection, face recognition, voice recognition are some important
techniques for computer safety.
Malware is designed to damage or do unwanted actions on a computer system.
A set of programs that identify and remove malware are known as antivirus software.
A firewall is a type of security program or hardware that prevents unauthorised access
to a computer network.
Exercise
A. Tick ( ) the correct option.
1. Norton is a/an ......................
a. System Software b. Operating System
c. Antivirus d. All of these
2. You can backup your data into ......................
a. UPS b. External Hard Drive
c. Mouse d. None of these
3. ..................... is a type of malware.
a. Encryption b. Trojan Horse
c. AVG d. None of these
B. Fill in the blanks using the words given below.
biometric, malware, encryption, decryption, zombie
1. Malacious software is known as ............................
2. Recognition of biological characteristics is an example of ........................... authentication.
3. ........................... is the process of converting encrypted data into a readable form.
4. Decryption is the opposite of ............................
5. ........................... works in a similar way as the spyware.
C. Short answer type questions:
1. What is meant by authentication? What are the types of authentication?
...................................................................................................................................................................................................
Computer Safety and Security 95

