Page 73 - 2619_PlusGPT V2.1_C-7
P. 73

2.  Solve the crossword using the clues given below:                            Critical Thinking
                       Across
                       1.  It is also called as network of networks.

                       2.  It is also called as Digital Dossier.
                       3.   It is the unauthorised access to computer system for the purpose of destroying the system
                           or stealing important information.
                       5.  The person who breaks into the computer system for stealing important information.

                       Down
                       4.   It is a symbol or word legally registered or established and used as representing a company
                           or a product.
                       6.   It is the use of electronic media such as smartphones, computers and tablets to harass or
                           attack a person.
                                                                                          6
                                                4


                               1                R


                                             2  D                                         R




                                         3      A


                                  5             K




                                                                                          G



                   Let's exPLore                                                                       Critical Thinking
                     Surf the Internet and search about the government initiatives about the cyber security.




                        teCh PraCtiCe                                                              Life Skills & Values

                     1.  Create a presentation on the topic ‘Unethical Practices’.

                     2.  Create a project on types of Intellectual Property Rights.



                                                      For The Teacher


                       Create a presentation on the topic 'Unethical Practices'.

                        Create a project on types of Intellectual Property Rights.



                                                                                                   Cyber Security  71
   68   69   70   71   72   73   74   75   76   77   78