Page 51 - 2611_SmartGPT Pro V(5.0) C-7
P. 51
d. What are the online or Internet-based illegal acts called? _______________
e. What is the property that arises from human intelligence called? _______________
5. Think and answer.
a. What is cyber security and why is it important?
______________________________________________________________________________________
b. Describe spamming and how it can be prevented.
______________________________________________________________________________________
c. What is phishing and what measures can be taken to avoid it?
______________________________________________________________________________________
______________________________________________________________________________________
______________________________________________________________________________________
d. Explain the concept of digital footprints.
______________________________________________________________________________________
______________________________________________________________________________________
______________________________________________________________________________________
21 st #Critical Thinking
6. Competency-based/Application-based questions. Century #Productivity & Accountability
Skills
a. Your friend has copied information from the Internet without crediting the source for his project.
Explain why this is unethical and what the consequences might be.
b. You are receiving an e-mail from a bank asking for your account details. What steps will you take to
ensure that this is not a phishing attempt?
21 st #Collaboration
GROUP DISCUSSION Century #Communication
Skills
Organise a group discussion on various legislations that support cyber security in India.
21 st #Creativity
LAB ACTIVITY Century #Technology Literacy
Skills
Prepare posters about the Internet Security and various measures we should practice while surfing
the Internet. Paste them all over your school and spread awareness in your neighbourhood.
Open Google Chrome and research government initiatives related to cybersecurity. Compile your
findings into a presentation.
Cyber Security 49

