Q.1. Fill in the blanks with the given words.
(i) Unsolicited commercial email is called Spam.
(ii) A Virus is a piece of code which is capable of replicating itself and typically has a detrimental effect, such as corrupting the system or destroying data.
(iii) The default privacy settings in social networking site is Public.
(iv) Confidentiality of information is defined as information to which the public does not have general access.
(v) An authentication process, ensures that authorized users are assigned confidential user identification and passwords.
(vi) Protect your computer and smartphone with strong, up-to-date security/anti-malware software.
(vii) Biographical Information is submitted voluntarily in social networking sites.
(viii) Tagging refers to assigning a keyword or phrase that describes the theme of a group of articles, photos, videos, or other types of media files in social networking sites.
(ix) Cyberstalking is a crime in which the attacker harasses a victim using electronic communication.
(x) A malware is a broad term used to describe all sorts of unwanted or malicious code.
Q.2. State whether the following statements are True (T) or False (F).
(i) Computer “virus” is a program which is developed by humans whose malicious intents is to disrupt the normal activity that can be done using a computer. True
(ii) Worms are usually parasitic in nature. False
(iii) Privacy is used to verify that a user sending a message is who he or she claims to be, and to provide the receiver with the means to encode a reply. False
(iv) Confidentiality of information is is defined as information to which you do not have general access. True
(v) Facebook is a malware. False
(vi) A virus can spread if you are using an infected media like Pen drives, CD, DVD, etc, which may have itself got infected from some other computer. True
(vii) Macro viruses infects files with .exe extension. False
(viii) Identity protection refers to the protection of personally identifiable information. True
(ix) Cyber safety refers to safe and responsible use of Information and Communication Technologies (ICT). True
(x) Polymorphic viruses have the capability of changing itself after infecting a computer. True
51 videos|44 docs|9 tests
|
|
Explore Courses for Grade 9 exam
|