Page 74 - Code Craft Computer-7
P. 74

5.    The term ____________ refers to a software which is used to identify, prevent, remove,
                           or deactivate the malicious software.
                           a. Antivirus                       b. Virus
                                                                                               5.   a   b    c    d
                           c.  Both a and b                   d. None of these

              B.     Gap-fill exercise.

                     1.   Cyberbullying is also known as _________ or _________.
                     2.   A person who commits a cyber crime is known as a _________.

                     3.   Cyberstalking is also known as _________.
                     4.   Antivirus is also known as _________ software.

                     5.   _________ is a security identification and authentication device.

              C.     True and False assessment.

                     1.   The safety of data is of utmost importance.
                     2.   Firewall software follows a set of rules that determines what can enter and leave
                           a network.

                     3.   Protecting a computer and its data against the virus attacks has become one of
                           the top priorities of our era.
                     4.   The term virus refers to a software which is used to identify, prevent, remove, or
                           deactivate the malicious software.

                     5.   You cannot remove viruses from your computer.

              D.     Give appropriate responses to the questions.

                     1.   What do you mean by computer ethics? Write about two computer ethics.
                     2.   What are intellectual rights? Explain any two.

                     3.   What is an antivirus? What tasks does it perform?
                     4.   What is Firewall? What role does it play?

                     5.   Define the term Digital footprint.



                      Analyt ical Skills


              Read the following situations, and identify the type of cybercrimes associated with each.

              1.     Ravi  invented  a  machine  and  protected  it  by  filing  a  patent. After  sometime,  one  of  his
                      colleagues copied his idea and created the same machine and claimed it as his own invention.
                      ______________

              2.     Vishal is a school student. Some days ago, he befriended a stranger on a social networking
                      platform. After some time, the person started harassing him by making insulting remarks
                      over the social networking platform. ______________




                                                                 74
   69   70   71   72   73   74   75   76   77   78   79