Page 84 - Cyber Safety C-4
P. 84
21 st #Communication
Century
Skills #Social Interaction
Advait, a Class 4 student in Bangalore, loved playing a game called “Treasure Hunt
Island” on his smart tablet. Every day after school, he played for many hours. Soon, he
started getting headaches, felt tired, and became upset whenever his mother asked
him to stop. He did not want to go outside or read anymore.
One day, Advait wanted a new “cheat code” to win quickly. He searched for it on
a normal search engine—even though his parents had set up a safer, child-friendly
one. He clicked the first link he saw. The website asked him to download an app, so
he quickly downloaded it. When the app opened, it asked for permission to use his
Camera, Photos, and Contacts. Advait felt confused but still clicked “Allow.”
Later that evening, a message appeared in the game from a player named “Captain_
Gold.” The profile had no real picture. At first, Captain_Gold chatted nicely, but after a
game, he suddenly sent a mean message saying, “You are such a bad player!” Advait
felt sad and did not know what to do.
A few minutes later, Captain_Gold sent another message saying, “Sorry. I will help
you win. Tell me your game password and home address, and I will send you a special
sword.”
Advait’s stomach felt tight. The player was acting strange—first mean, then too friendly,
and now asking for personal details. Advait remembered something from his cyber
safety lessons, but he was not sure what to do next.
He stopped playing and went to tell his mother what had happened.
Based on the above case, answer the following questions:
1. What game did Advait enjoy playing on his tablet?
(i) Treasure Hunt Island
(ii) Super Mario
(iii) Minecraft
(iv) Candy Crush
82 Computer Science - IV

