Page 74 - Code Craft Computer-7
P. 74
5. The term ____________ refers to a software which is used to identify, prevent, remove,
or deactivate the malicious software.
a. Antivirus b. Virus
5. a b c d
c. Both a and b d. None of these
B. Gap-fill exercise.
1. Cyberbullying is also known as _________ or _________.
2. A person who commits a cyber crime is known as a _________.
3. Cyberstalking is also known as _________.
4. Antivirus is also known as _________ software.
5. _________ is a security identification and authentication device.
C. True and False assessment.
1. The safety of data is of utmost importance.
2. Firewall software follows a set of rules that determines what can enter and leave
a network.
3. Protecting a computer and its data against the virus attacks has become one of
the top priorities of our era.
4. The term virus refers to a software which is used to identify, prevent, remove, or
deactivate the malicious software.
5. You cannot remove viruses from your computer.
D. Give appropriate responses to the questions.
1. What do you mean by computer ethics? Write about two computer ethics.
2. What are intellectual rights? Explain any two.
3. What is an antivirus? What tasks does it perform?
4. What is Firewall? What role does it play?
5. Define the term Digital footprint.
Analyt ical Skills
Read the following situations, and identify the type of cybercrimes associated with each.
1. Ravi invented a machine and protected it by filing a patent. After sometime, one of his
colleagues copied his idea and created the same machine and claimed it as his own invention.
______________
2. Vishal is a school student. Some days ago, he befriended a stranger on a social networking
platform. After some time, the person started harassing him by making insulting remarks
over the social networking platform. ______________
74

