Page 62 - PlusGPT_V2.1_C8_Flipbook
P. 62
g. Explain different kinds of online threats.
__________________________________________________________________________________
__________________________________________________________________________________
h. Explain the need to clear data stored in browsers.
__________________________________________________________________________________
__________________________________________________________________________________
i. Explain any four best practices to secure data.
__________________________________________________________________________________
__________________________________________________________________________________
fun Zone
Let's soLve Critical Thinking
1. Guess my name.
a. My name resembles a micro organism. My prime motive is not to
cause damage but clone myself on the host system. ____________
b. I specialise in concealing myself. Though, I belong to cyber world but
my name has its roots in Greek mythology. ____________
c. I do not collect information from the computer. I wait for the hacker
to give me commands. ____________
2. Application based questions. Experiential Learning
a. Manisha wants to prevent other people from accessing her computer without permission.
Which security measure would help her in this situation?
b. Nitin is working on some important data. If he modifies the data then he won’t be able to
use the original data. The original data would be required for future use. What can he do
with the data to make sure that the original data is preserved?
c. Anuj is working on his computer. Suddenly, the computer slows down and some unwanted
files appear automatically. Help him to identify the problem with his computer and suggest
him a way to resolve the problem.
60 Premium Edition-VIII

