Page 62 - PlusGPT_V2.1_C8_Flipbook
P. 62

g.  Explain different kinds of online threats.

                        __________________________________________________________________________________
                        __________________________________________________________________________________

                     h.  Explain the need to clear data stored in browsers.

                        __________________________________________________________________________________

                        __________________________________________________________________________________

                     i.   Explain any four best practices to secure data.
                        __________________________________________________________________________________


                        __________________________________________________________________________________


                  fun Zone





                    Let's soLve                                                                         Critical Thinking

                      1.   Guess my name.

                         a.   My name resembles a micro organism. My prime motive is not to

                            cause damage but clone myself on the host system.                             ____________
                         b.   I specialise in concealing myself. Though, I belong to cyber world but

                            my name has its roots in Greek mythology.                                     ____________
                         c.   I do not collect information from the computer. I wait for the hacker

                            to give me commands.                                                          ____________


                      2.  Application based questions.                                               Experiential Learning
                         a.   Manisha wants to prevent other people from accessing her computer without permission.

                            Which security measure would help her in this situation?

                         b.   Nitin is working on some important data. If he modifies the data then he won’t be able to
                            use the original data. The original data would be required for future use. What can he do
                            with the data to make sure that the original data is preserved?

                         c.   Anuj is working on his computer. Suddenly, the computer slows down and some unwanted

                            files appear automatically. Help him to identify the problem with his computer and suggest
                            him a way to resolve the problem.









                  60    Premium Edition-VIII
   57   58   59   60   61   62   63   64   65   66   67