Page 66 - KEC Khaitan C6 Flipbook
P. 66
b. You are receiving an e-mail from a bank asking for your account details. What steps will you take to
ensure that this is not a phishing attempt?
______________________________________________________________________________________
______________________________________________________________________________________
c. You receive an email from an unknown sender asking for your personal details. How would you iden-
tify if it is a cyber threat?
______________________________________________________________________________________
______________________________________________________________________________________
21 st #Creativity
LAB ACTIVITY Century #Technology Literacy
Skills
Prepare posters about the Internet Security and various measures we should practice while surfing
the Internet. Paste them all over your school and spread awareness in your neighbourhood.
Go to your computer lab, open Chrome, and research government initiatives related to
cybersecurity. Compile your findings into a presentation.
21 st #Collaboration
Century
FUN ACTIVITY Skills #Creativity
Talk to your parents and grandparents and find out what life was like before the advent of the
Internet. Now draw a comparison chart on collected data.
COding Zone COding Zone {} = COding Zone
{C ding z ne}
#Initiative
21 st
Century
#Information Literacy
Skills
</>
1. In a certain code language:
CAT is coded as 3120, DOG is coded as 4157. What is the code for BAT?
2. If in a certain code language:
STAR is coded as 211819, what will be the code for MOON?
FOR THE TEACHER
1. Explain various types of threats related to sharing cyber space.
2. Discuss the rules that govern our actions when we use computers and the Internet, how it would be helpful to
become responsible users.
64 Premium Edition-VI

