Page 33 - 2619_PlusGPT V2.1_C-8
P. 33

g.  Explain different kinds of online threats.

                      __________________________________________________________________________________
                      __________________________________________________________________________________

                    h.  Explain the need to clear data stored in browsers.

                      __________________________________________________________________________________

                      __________________________________________________________________________________

                    i.   Explain any four best practices to secure data.

                      __________________________________________________________________________________

                      __________________________________________________________________________________



                                                                                       fun Zone




                   Let's soLve                                                                         Critical Thinking

                     1.   Guess my name.

                        a.   My name resembles a micro organism. My prime motive is not to

                           cause damage but clone myself on the host system.                            ____________
                        b.   I specialise in concealing myself. Though, I belong to cyber world but

                           my name has its roots in Greek mythology.                                    ____________
                        c.   I do not collect information from the computer. I wait for the hacker

                           to give me commands.                                                         ____________


                     2.  Competency-based questions.                                               Experiential Learning
                        a.   Manisha wants to prevent other people from accessing her computer without permission.

                           Which security measure would help her in this situation?

                        b.   Nitin is working on some important data. If he modifies the data then he won’t be able to
                           use the original data. The original data would be required for future use. What can he do
                           with the data to make sure that the original data is preserved?

                        c.   Anuj is working on his computer. Suddenly, the computer slows down and some unwanted

                           files appear automatically. Help him to identify the problem with his computer and suggest
                           him a way to resolve the problem.









                                                                                                   Cyber Security  31
   28   29   30   31   32   33   34   35   36   37   38