TASK
Choose the correct option for the following statements.
- A ________ is the interconnection of devices within the environment of an individual through Wi-Fi, Bluetooth or infrared signals.
- Personal Area Network (PAN)
- Local Area Network (LAN)
- Metropolitan Area Network (MAN)
- Wide Area Network (WAN)
- A ________ connects within a limited area such as a residence, school or
office building.
- Personal Area Network (PAN)
- Local Area Network (LAN)
- Metropolitan Area Network (MAN)
- Wide Area Network (WAN)
- ________ is classified as privacy-invasive software.
- A Virus
- A Worm
- A Trojan Horse
- Spyware
- ________is a harmful piece of software that looks genuine.
- Trojan Horse
- Spyware
- Phishing Scam
- Hoax
Module One: ALL ABOUT COMPUTERS, INTERNET & MIRCROSOFT EDGEActivity 2
Fill in the blanks with the appropriate words provided in
the box.
Worms Trojans Peer-to-Peer Spyware Password
- A ________ is a set of characters used to get access to a computer, web page
or network resource.
- ________are known to create back-doors to give malicious users access to
the system.
- ________ are standalone malicious software and do not require a host
program to spread.
- A ________system doesn’t have a central computer.Activity 3
Choose TRUE or FALSE for the following statements.
- Wireless Networks do not use wires for connection.
( ) TRUE
( ) FALSE
- Malicious software is any program or file that is not harmful to your
computer.
( ) TRUE
( ) FALSE
- A peer-to-peer network system has a central computer to coordinate and
supply services to other computers in the network.
( ) TRUE
( ) FALSE
- Internet Backup involves backing up of data onto several servers on the
internet.
( ) TRUE
( ) FALSE