Grade8 No1
Grade8 No1
1. Antivirus software can prevent all types of malware from infecting your computer.
2. Regular software updates help protect against security vulnerabilities.
5. A VPN (Virtual Private Network) is used to secure internet connections and protect
privacy.
1. Explain the difference between a virus and a worm in terms of computer security.
3. Describe three common ways to protect your computer from cyber threats.
a) ___________________________________________________________
b) ___________________________________________________________
c) ___________________________________________________________
4. What is phishing, and how can you protect yourself from it?
3. To protect against cyber attacks, it is important to use __________ such as passwords, PINs,
or biometric data to verify users' identities.
4. __________ attacks involve flooding a network with excessive traffic to overload the system
and make it unavailable to users.
5. A __________ is a software program designed to detect and remove viruses, malware, and
other security threats.
6. A __________ is a secure connection between a client and a server over the internet, often
indicated by "https://" in the web address.
7. __________ is the process of converting data into a format that cannot be easily understood
by unauthorized users.
8. __________ is a security measure where data is stored in such a way that it can be recovered
if lost, damaged, or stolen.
9. __________ is the practice of keeping software up to date with the latest patches and
updates to fix security vulnerabilities.
10. A __________ is a legal agreement that restricts how software can be used, distributed, or
copied.
11. A __________ is a malicious program that spreads itself by attaching to files or programs,
often causing harm to the system or stealing information.
13. A __________ is a common type of cyber attack in which attackers use deceptive emails to
trick individuals into revealing sensitive information.
14. __________ is a process of verifying the identity of a user or device, often using usernames,
passwords, or security questions.
15. A __________ is a system used to monitor and control access to computer networks and
prevent unauthorized access.
Answer Key
Section A:
3. b) Phishing
4. b) Monitors and controls incoming and outgoing network traffic
Section B:
1. False
2. True
3. False
4. True
5. True
Section C:
1. A virus needs a host program to spread, while a worm is a standalone program that can
spread by itself.
Section D:
1. Security
2. Virus
3. Authentication
4. Denial-of-Service (DoS)
5. Antivirus
6. SSL/TLS
7. Encryption
8. Backup
9. Patching
10. License
11. Worm
12. Hacking
13. Phishing
14. Authentication
15. Firewall