Skip to content
08. Online Surfing And Cyber Security

icon picker
Fill in the Blanks

Prepared by: learnloophq@gmail.com
Last edited 10 days ago by Learn LoopHQ.

Chapter: 08. Online Surfing And Cyber Security

Fill in the Blanks

The Internet is a _ _ _ _ _ _ _ _ _ _ _ _ _ _ accessible from all over the world.
global network
_ _ _ _ _ _ _ _ _ _ _ _ _ _ stands for electronic mail.
E-mail
The technique of watching the person while talking to them is called _ _ _ _ _ _ _ _ _ _ _ _ _ _.
video conferencing
The first VoIP service was developed in 1973 by _ _ _ _ _ _ _ _ _ _ _ _ _ _.
Danny Cohen
VoIP is available on _ _ _ _ _ _ _ _ _ _ _ _ _ _, personal computers, laptops and other hardware devices.
smartphones
_ _ _ _ _ _ _ _ _ _ _ _ _ _ refers to communication in the form of small messages among the computers over the Internet.
Online chat
Facebook, is the most popular _ _ _ _ _ _ _ _ _ _ _ _ _ _ service.
social networking
Facebook allows you to store a brief profile about yourself, your photos, _ _ _ _ _ _ _ _ _ _ _ _ _ _ and dislikes.
likes
A _ _ _ _ _ _ _ _ _ _ _ _ _ _ is an online discussion group where people talk about a specific topic.
newsgroup
The News Admin keeps a check on the _ _ _ _ _ _ _ _ _ _ _ _ _ _ of participants in a newsgroup.
comments
An _ _ _ _ _ _ _ _ _ _ _ _ _ _ is just like a paper greeting card, created with the help of digital text and effects.
e-greeting
Two popular e-greetings websites are and _ _ _ _ _ _ _ _ _ _ _ _ _ _.
The first e-greeting card website was created by _ _ _ _ _ _ _ _ _ _ _ _ _ _ in December 1994.
Judith Donath
_ _ _ _ _ _ _ _ _ _ _ _ _ _ facility is also a part of e-banking where you can withdraw cash from any of the ATM machines.
ATM
Cloud storage is a service where the users are able to store and manage data on a _ _ _ _ _ _ _ _ _ _ _ _ _ _ in place of their local computer.
remote server
Never provide personal information, such as address, phone number, or school name or location, while using the _ _ _ _ _ _ _ _ _ _ _ _ _ _.
Internet
You should use the Internet only in the presence of your _ _ _ _ _ _ _ _ _ _ _ _ _ _.
elders
_ _ _ _ _ _ _ _ _ _ _ _ _ _ are the rules that are expected to be followed while meeting or communicating with others online.
Netiquettes
In an email, _ _ _ _ _ _ _ _ _ _ _ _ _ _ must be small and simple.
signatures
Avoid typing in _ _ _ _ _ _ _ _ _ _ _ _ _ _ letters as it is considered shouting at the person.
capital
_ _ _ _ _ _ _ _ _ _ _ _ _ _ is a criminal activity in which computers are used to damage data, steal data, or disrupt the digital life of a person.
Cyber threat
_ _ _ _ _ _ _ _ _ _ _ _ _ _ refers to the process of changing the data going into or out of a computer.
Data Diddling
_ _ _ _ _ _ _ _ _ _ _ _ _ _ is a crime committed against telephone companies by using computers.
Phreaking
In _ _ _ _ _ _ _ _ _ _ _ _ _ _, scanners are used to steal the electronic serial numbers of cellular phones.
Cloning
_ _ _ _ _ _ _ _ _ _ _ _ _ _ refers to the process of stealing credit card numbers online.
Carding
The process of stealing personal information, changing financial data, and breaking security systems to gain unauthorised access to computer systems is called _ _ _ _ _ _ _ _ _ _ _ _ _ _.
cracking
The process of protecting computer resources such as networks, devices, programs, and data from unauthorised access, damage, or attack is called _ _ _ _ _ _ _ _ _ _ _ _ _ _.
cyber security
One of the reasons for increased cyber crimes is _ _ _ _ _ _ _ _ _ _ _ _ _ _ in software.
existing loopholes
Want to print your doc?
This is not the way.
Try clicking the ⋯ next to your doc name or using a keyboard shortcut (
CtrlP
) instead.