Chapter 2: Browsing Safely
A. Fill in the blanks.
1. Cyberbullying
2. Cybercrime
3. Cybergrooming
4. Password, OTP
5. Antivirus
B. State True or False.
1. False
2. False
3. True
4. True
5. True
C. Select the correct option.
1. a. Hacking
2. c. Identity Theft
3. b. Cyberbullying
4. a. Firewall
5. b. Bank Fraud
D. Competency-based question.
Vinita should suggest a strong password that combines uppercase and lowercase letters, numbers, and special characters.
E. Answer the following questions.
1. Cybercrime is any criminal activity intended to harm anyone using a computer and an internet connection. An example of cybercrime is online identity theft, which refers to the act of stealing and misusing someone's personal information, such as login credentials or financial details.
2. Phishing is the act of sending an email to a user; misleading him to believe that it is from a trusted person or organisation. The user is asked to visit a fake website and update or validate his personal details, such as his username, password, and credit card details. This information is used by criminals to commit crimes in your name.
3. Two ways to protect ourselves from being a victim of cybercrimes are:
● Do not accept friend requests from unknown people on social media.
● Do not share your personal details, like date of birth, phone number, address, and parents' office address on social media.
4. In email spoofing, the receiver of a message is fooled into believing that the message received by him is from a trusted source, which is actually not true. The message is bogus. When a user clicks on the link that is falsely provided by the sender, the malware or virus enters the user's system.
5. Cyber security is a collection of technologies, processes, and practices designed to protect networks, computers, programs, and data from attack, damage, or unauthorised access.
No comments:
Post a Comment