Choose the correct option for the following statements.
1. A ________ is the interconnection of devices within the environment of
an individual through Wi-Fi, Bluetooth or infrared signals.
a. Personal Area Network (PAN)
b. Local Area Network (LAN)
c. Metropolitan Area Network (MAN)
d. Wide Area Network (WAN)
2. A ________ connects within a limited area such as a residence, school or
office building.
a. Personal Area Network (PAN)
b. Local Area Network (LAN)
c. Metropolitan Area Network (MAN)
d. Wide Area Network (WAN)
3. ________ is classified as privacy-invasive software.
a. A Virus
b. A Worm
c. A Trojan Horse
d. Spyware
4. ________is a harmful piece of software that looks genuine.
a. Trojan Horse
b. Spyware
c. Phishing Scam
d. Hoax
Fill in the blanks with the appropriate words provided in
the box.
Worms Trojans Peer-to-Peer Spyware Password
1. A ________ is a set of characters used to get access to a computer, web page
or network resource.
2. ________are known to create back-doors to give malicious users access to
the system.
3. ________ are standalone malicious software and do not require a host
program to spread.
4. A ________system doesn’t have a central computer.Activity 3
Choose TRUE or FALSE for the following statements.
1. Wireless Networks do not use wires for connection.
( ) TRUE
( ) FALSE
2. Malicious software is any program or file that is not harmful to your
computer.
( ) TRUE
( ) FALSE
3. A peer-to-peer network system has a central computer to coordinate and
supply services to other computers in the network.
( ) TRUE
( ) FALSE
4. Internet Backup involves backing up of data onto several servers on the
internet.
( ) TRUE
( ) FALSE