Skip to content
Practice Sheets

icon picker
Fill in the Blanks

Prepared by: learnloophq@gmail.com
Last edited 10 days ago by Learn LoopHQ.

Chapter: 08. Online Surfing And Cyber Security

Fill in the Blanks

_ _ _ _ _ _ _ _ _ _ _ _ _ _ is a criminal activity in which computers are used to damage data, steal data, or disrupt the digital life of a person.
VoIP is available on _ _ _ _ _ _ _ _ _ _ _ _ _ _, personal computers, laptops and other hardware devices.
The News Admin keeps a check on the _ _ _ _ _ _ _ _ _ _ _ _ _ _ of participants in a newsgroup.
_ _ _ _ _ _ _ _ _ _ _ _ _ _ are the rules that are expected to be followed while meeting or communicating with others online.
The Internet is a _ _ _ _ _ _ _ _ _ _ _ _ _ _ accessible from all over the world.
You should use the Internet only in the presence of your _ _ _ _ _ _ _ _ _ _ _ _ _ _.
_ _ _ _ _ _ _ _ _ _ _ _ _ _ facility is also a part of e-banking where you can withdraw cash from any of the ATM machines.
One of the reasons for increased cyber crimes is _ _ _ _ _ _ _ _ _ _ _ _ _ _ in software.
_ _ _ _ _ _ _ _ _ _ _ _ _ _ is a crime committed against telephone companies by using computers.
_ _ _ _ _ _ _ _ _ _ _ _ _ _ stands for electronic mail.
The process of stealing personal information, changing financial data, and breaking security systems to gain unauthorised access to computer systems is called _ _ _ _ _ _ _ _ _ _ _ _ _ _.
In an email, _ _ _ _ _ _ _ _ _ _ _ _ _ _ must be small and simple.
In _ _ _ _ _ _ _ _ _ _ _ _ _ _, scanners are used to steal the electronic serial numbers of cellular phones.
Two popular e-greetings websites are and _ _ _ _ _ _ _ _ _ _ _ _ _ _.
Facebook, is the most popular _ _ _ _ _ _ _ _ _ _ _ _ _ _ service.
Avoid typing in _ _ _ _ _ _ _ _ _ _ _ _ _ _ letters as it is considered shouting at the person.
The first e-greeting card website was created by _ _ _ _ _ _ _ _ _ _ _ _ _ _ in December 1994.
An _ _ _ _ _ _ _ _ _ _ _ _ _ _ is just like a paper greeting card, created with the help of digital text and effects.
The process of protecting computer resources such as networks, devices, programs, and data from unauthorised access, damage, or attack is called _ _ _ _ _ _ _ _ _ _ _ _ _ _.
Never provide personal information, such as address, phone number, or school name or location, while using the _ _ _ _ _ _ _ _ _ _ _ _ _ _.
A _ _ _ _ _ _ _ _ _ _ _ _ _ _ is an online discussion group where people talk about a specific topic.
The first VoIP service was developed in 1973 by _ _ _ _ _ _ _ _ _ _ _ _ _ _.
_ _ _ _ _ _ _ _ _ _ _ _ _ _ refers to the process of changing the data going into or out of a computer.
_ _ _ _ _ _ _ _ _ _ _ _ _ _ refers to the process of stealing credit card numbers online.
The technique of watching the person while talking to them is called _ _ _ _ _ _ _ _ _ _ _ _ _ _.
Facebook allows you to store a brief profile about yourself, your photos, _ _ _ _ _ _ _ _ _ _ _ _ _ _ and dislikes.
_ _ _ _ _ _ _ _ _ _ _ _ _ _ refers to communication in the form of small messages among the computers over the Internet.
Cloud storage is a service where the users are able to store and manage data on a _ _ _ _ _ _ _ _ _ _ _ _ _ _ in place of their local computer.
Want to print your doc?
This is not the way.
Try clicking the ⋯ next to your doc name or using a keyboard shortcut (
CtrlP
) instead.