Page 80 - CA_165_V2.0_C9_Flipbook
P. 80

SECTION C
                                               (Case-based/Passage-based Type Questions)

                  A.   Privacy in Information Technology refers to personal control over one’s own files and documents. It also refers
                      to the right and ability to keep control over the information that one reveals or uploads over the Internet and
                      to have a control over the selection of viewers or users who can access that information.
                      1.   When visiting sites where you win something or they are giving something away, you will ...............................
                          i.  give your name, phone number, and address       ii.  give parents information

                          iii.  give no personal information                  iv.  give whatever information they request
                      2.     You are online and you get an instant message from your Internet service provider needing your password
                          .....................................
                          i.  I give it to them because they are my ISP       ii.  I ask them why they need it
                          iii.  I never give my password to anyone            iv.  I log off without giving any information
                      3.   What is the private browsing mode in Internet Explorer/Edge called?

                          i.  InPrivate                                       ii.  Incognito
                          iii.  PrivateIn                                     iv.  All of these
                  B.   Tejas received an email saying he won a lottery and needs to enter his bank details to claim it.
                      1.   What type of cyber attack is this?

                          i.  Hacking                                         ii.   hishing
                          iii.  Ransomware                                    iv.  Spoofing
                      2.   How should Tejas respond to this email?
                          i.  Enter his bank details immediately to claim the prize
                          ii.  Forward the email to his friends to check if it is real

                          iii.  Ignore the email and report it as spam
                          iv.  Click on the link provided to verify the sender
                      3.   What safety measure should be followed to prevent such scams?
                          i.  Always trust emails that offer rewards

                          ii.  Verify the sender and avoid clicking on suspicious links
                          iii.  Enter personal details only if the email looks official
                          iv.  Download attachments from unknown emails


























                   78    Touchpad Computer Applications (Ver. 2.0)-IX
   75   76   77   78   79   80   81   82   83   84   85