Page 130 - Viva ICSE Computer Studies 6 : E-book
P. 130
C. Choose the correct answer.
1. _______________ is a small software program that uses computer networks and takes
advantage of security weaknesses to replicate.
(a) Worm (b) Trojan
(c) Scareware (d) Malware
2. _________________ is a computer program that tricks the user by acting as an original fi le.
(a) Malware (b) Spyware
(c) Trojan horse (d) Virus
3. The _________________ traces the browsing habits of the user, aff ects the network system
and slows down the device in use.
(a) virus (b) spyware
(c) ransomware (d) cookies
4. The cyber criminals use the ____________________ as a spyware tool to steal the personal
information of the users.
(a) cookies (b) ransomware
(c) malware (d) keylogger
5. _______________ monitors activities of the user on a computer without his/her permission.
(a) Malware (b) Scareware
(c) Trojan horse (d) Ransomware
D. Name the following.
1. Two software to make free audio and video calls _______________ _______________
2. Software installed in a device without the user’s knowledge
and designed to collect information from the device _______________
3. Two websites that provide free e-mail accounts _______________ _______________
4. Name of the mail server _______________
5. Step for entering into a personal e-mail account _______________
E. Answer the following questions.
1. Diff erentiate between viruses, spyware and spamming.
2. Write a note on e-mail and its features. Enlist its advantages and disadvantages.
3. What are the basic steps involved in the process of video conferencing?
4. Write steps to attach a fi le to an e-mail.
5. What is netiquette? Enlist six netiquettes to be followed when online.
118