Choose the correct option for the following statements.
A ________ is the interconnection of devices within the environment of an individual through Wi-Fi, Bluetooth or infrared signals.
Personal Area Network (PAN)
Local Area Network (LAN)
Metropolitan Area Network (MAN)
Wide Area Network (WAN)
A ________ connects within a limited area such as a residence, school or office building.
Personal Area Network (PAN)
Local Area Network (LAN)
Metropolitan Area Network (MAN)
Wide Area Network (WAN)
________ is classified as privacy-invasive software.
A Virus
A Worm
A Trojan Horse
Spyware
________is a harmful piece of software that looks genuine.
Trojan Horse
Spyware
Phishing Scam
Hoax
Module One: ALL ABOUT COMPUTERS, INTERNET & MIRCROSOFT EDGE Activity 2
Fill in the blanks with the appropriate words provided in the box.
Worms Trojans Peer-to-Peer Spyware Password
A ________ is a set of characters used to get access to a computer, web page or network resource.
________are known to create back-doors to give malicious users access to the system.
________ are standalone malicious software and do not require a host program to spread.
A ________system doesn’t have a central computer.Activity 3
Choose TRUE or FALSE for the following statements.
Wireless Networks do not use wires for connection.
( ) TRUE
( ) FALSE
Malicious software is any program or file that is not harmful to your computer.
( ) TRUE
( ) FALSE
A peer-to-peer network system has a central computer to coordinate and supply services to other computers in the network.
( ) TRUE
( ) FALSE
Internet Backup involves backing up of data onto several servers on the internet.
( ) TRUE
( ) FALSE