Page 80 - CA_165_V2.0_C9_Flipbook
P. 80
SECTION C
(Case-based/Passage-based Type Questions)
A. Privacy in Information Technology refers to personal control over one’s own files and documents. It also refers
to the right and ability to keep control over the information that one reveals or uploads over the Internet and
to have a control over the selection of viewers or users who can access that information.
1. When visiting sites where you win something or they are giving something away, you will ...............................
i. give your name, phone number, and address ii. give parents information
iii. give no personal information iv. give whatever information they request
2. You are online and you get an instant message from your Internet service provider needing your password
.....................................
i. I give it to them because they are my ISP ii. I ask them why they need it
iii. I never give my password to anyone iv. I log off without giving any information
3. What is the private browsing mode in Internet Explorer/Edge called?
i. InPrivate ii. Incognito
iii. PrivateIn iv. All of these
B. Tejas received an email saying he won a lottery and needs to enter his bank details to claim it.
1. What type of cyber attack is this?
i. Hacking ii. hishing
iii. Ransomware iv. Spoofing
2. How should Tejas respond to this email?
i. Enter his bank details immediately to claim the prize
ii. Forward the email to his friends to check if it is real
iii. Ignore the email and report it as spam
iv. Click on the link provided to verify the sender
3. What safety measure should be followed to prevent such scams?
i. Always trust emails that offer rewards
ii. Verify the sender and avoid clicking on suspicious links
iii. Enter personal details only if the email looks official
iv. Download attachments from unknown emails
78 Touchpad Computer Applications (Ver. 2.0)-IX

