Friday, February 12, 2021

Class-8 Chapter-12 Solved Exercise

 

Class -8

Chapter-12

MCQ

1              A

2              A

3              B

4              B

5              A

6              C

True/ False

1              F

2              T

3              F

4              F

5              T

6              F

Fill in Blanks

1              Cyber Threat

2              Personal Information

3              Password

4              Social Engineering

5              Cookies

6              Worm

Match The following

1              D

2              E

3              A

4              C

5              B

6              G

7              F

One Word Answer

1             

Ans. A Trojan Horse is programme to deceive the user by appearing to be a genuine file (like an image or video or a software utility).

2             

Ans. Adware is short form for advertising –supported software.

3             

Ans. Cookies are data sent from a website and stored in a user’s web browser while a user is browsing a website.

4             

Ans. Kespersky, Symantec, AVG

5             

Ans. Denial of Service (DOS)

 

Answer the Following

1.

Ans. Cyber threat is any such act which can result in an undesirable incident that could harm to your computer activities .

2.

Ans.  Worm:- Worm is a software program that actively transmit itself over a network to infect other computer but unlike a virus.

Spyware:- Spyware includes software programs that are installed on your computer to steal information from your computer on an ongoing basis without your knowledge.

3.

Ans. Many Spammers and hackers send e-mails to unsuspecting persons to get their credit card or bank information. Such messages are called Phishing Messages.

4.

Ans. Spam messages are sent to lure you to take actions that may lead to other unwanted implications like downloading of malware on your computer. These unwanted messages by email or even by SMS are known as Spam.

5.

Ans. A firewall is a system designed to prevent unauthorized use of and access to your computer. A firewall can be either hardware or software. If you are using Windows, you can use the built-in Windows firewall.

No comments:

Post a Comment