Choose the correct option for the following statements.
1. A ________ is the interconnection of devices within the environment of
an individual through Wi-Fi, Bluetooth or infrared signals.
a. Personal Area Network (PAN)
b. Local Area Network (LAN)
c. Metropolitan Area Network (MAN)
d. Wide Area Network (WAN)
2. A ________ connects within a limited area such as a residence, school or
office building.
a. Personal Area Network (PAN)
b. Local Area Network (LAN)
c. Metropolitan Area Network (MAN)
d. Wide Area Network (WAN)
3. ________ is classified as privacy-invasive software.
a. A Virus
b. A Worm
c. A Trojan Horse
d. Spyware
4. ________is a harmful piece of software that looks genuine.
a. Trojan Horse
b. Spyware
c. Phishing Scam
d. Hoax

Module One: ALL ABOUT COMPUTERS, INTERNET & MIRCROSOFT EDGEActivity 2

Fill in the blanks with the appropriate words provided in
the box.
Worms Trojans Peer-to-Peer Spyware Password
1. A ________ is a set of characters used to get access to a computer, web page
or network resource.
2. ________are known to create back-doors to give malicious users access to
the system.
3. ________ are standalone malicious software and do not require a host
program to spread.
4. A ________system doesn’t have a central computer.Activity 3
Choose TRUE or FALSE for the following statements.
1. Wireless Networks do not use wires for connection.
( ) TRUE
( ) FALSE
2. Malicious software is any program or file that is not harmful to your
computer.
( ) TRUE
( ) FALSE
3. A peer-to-peer network system has a central computer to coordinate and
supply services to other computers in the network.
( ) TRUE
( ) FALSE
4. Internet Backup involves backing up of data onto several servers on the
internet.
( ) TRUE
( ) FALSE