Fill in the blanks with the appropriate words provided in the box.

Choose the correct option for the following statements.

A ________ is the interconnection of devices within the environment of an individual through Wi-Fi, Bluetooth or infrared signals.

Personal Area Network (PAN)

Local Area Network (LAN)

Metropolitan Area Network (MAN)

Wide Area Network (WAN)

A ________ connects within a limited area such as a residence, school or office building.

Personal Area Network (PAN)

Local Area Network (LAN)

Metropolitan Area Network (MAN)

Wide Area Network (WAN)

________ is classified as privacy-invasive software.

A Virus

A Worm

A Trojan Horse

Spyware

________is a harmful piece of software that looks genuine.

Trojan Horse

Spyware

Phishing Scam

Hoax

Module One: ALL ABOUT COMPUTERS, INTERNET & MIRCROSOFT EDGE Activity 2

Fill in the blanks with the appropriate words provided in the box.

Worms Trojans Peer-to-Peer Spyware Password

A ________ is a set of characters used to get access to a computer, web page or network resource.

________are known to create back-doors to give malicious users access to the system.

________ are standalone malicious software and do not require a host program to spread.

A ________system doesn’t have a central computer.Activity 3

Choose TRUE or FALSE for the following statements.

Wireless Networks do not use wires for connection.

( ) TRUE

( ) FALSE

Malicious software is any program or file that is not harmful to your computer.

( ) TRUE

( ) FALSE

A peer-to-peer network system has a central computer to coordinate and supply services to other computers in the network.

( ) TRUE

( ) FALSE

Internet Backup involves backing up of data onto several servers on the internet.

( ) TRUE

( ) FALSE