Page 74 - Plus_V2.2_C8_Flipbook
P. 74
fun Zone
Let's soLve
1. Application based questions. Experiential Learning
a. Manisha wants to prevent other people from accessing her computer without permission.
Which security measure would help her in this situation?
b. Nitin is working on some important data. If he modifies the data then he won’t be able to
use the original data. The original data would be required for future use. What can he do
with the data to make sure that the original data is preserved?
c. Anuj is working on his computer. Suddenly, the computer slows down and some unwanted
files appear automatically. Help him to identify the problem with his computer and suggest
him a way to resolve the problem.
2. Guess my name. Critical Thinking
a. My name resembles a micro organism. My prime motive is not to
cause damage but clone myself on the host system. ____________
b. I specialise in concealing myself. Though, I belong to cyber world but
my name has its roots in Greek mythology. ____________
c. I do not collect information from the computer. I wait for the hacker
to give me commands. ____________
Let's exPLore Interdisciplinary
Surf the internet to find the latest antiviruses and protective measures you can use to secure
your computer.
Let's get Better Life Skills & Values
Do you think it is acceptable to steal other's information? Discuss with your class.
teCh PraCtiCe Subject Enrichment
1. Surf Internet and learn the process of taking the backup of data.
2. Learn how to choose the password for your e-mail account.
For The Teacher
Show the process of keeping the computer physically clean.
Discuss methods of password protection.
Show how an antivirus works.
72 Premium Edition-VIII

