Page 130 - Viva ICSE Computer Studies 6 : E-book
P. 130

C.  Choose the correct answer.

                         1. _______________ is a small software program that uses computer networks and takes
                             advantage of security weaknesses to replicate.
                            (a)  Worm                                 (b) Trojan

                            (c)  Scareware                            (d) Malware
                         2. _________________ is a computer program that tricks the user by acting as an original fi le.

                            (a)  Malware                              (b) Spyware

                            (c)  Trojan horse                         (d) Virus
                         3. The _________________ traces the browsing habits of the user, aff ects the network system
                             and slows down the device in use.

                            (a)  virus                                (b) spyware
                            (c)  ransomware                           (d) cookies

                         4.  The cyber criminals use the ____________________ as a spyware tool to steal the personal
                             information of the users.
                            (a)  cookies                              (b) ransomware

                            (c)  malware                              (d) keylogger

                         5. _______________ monitors activities of the user on a computer without his/her permission.
                            (a)  Malware                              (b) Scareware

                            (c)  Trojan horse                         (d) Ransomware

                    D.  Name the following.

                         1.  Two software to make free audio and video calls      _______________  _______________

                         2.  Software installed in a device without the user’s knowledge
                             and designed to collect information from the device                      _______________

                         3.  Two websites that provide free e-mail accounts       _______________  _______________
                         4.  Name of the mail server                                                  _______________

                         5.  Step for entering into a personal e-mail account                         _______________

                    E.  Answer the following questions.

                         1. Diff erentiate between viruses, spyware and spamming.

                         2.  Write a note on e-mail and its features. Enlist its advantages and disadvantages.
                         3.  What are the basic steps involved in the process of video conferencing?

                         4.  Write steps to attach a fi le to an e-mail.
                         5.  What is netiquette? Enlist six netiquettes to be followed when online.





                    118
   125   126   127   128   129   130   131   132   133   134   135