Page 102 - Cyber Safety C-5
P. 102

Tara was working on the final video on her laptop. She needed to transfer files from her
                    phone, so she logged into her cloud storage on a school computer. She told herself she
                    would log out later, but she forgot. The next morning, she found a new post on her social
                    media account: “Check out our Ek Bharat Shreshtha Bharat Project before anyone
                    else!” —posted from an unknown device. As she had used the same weak password
                    everywhere: Tara123, someone using the school computer accessed her account and
                    stole her files!

                    During editing, Rishi  added  a  beautiful  background  song  he found  online.  It was a
                    melody created by a Class 7 senior, Aarohi. She noticed her song being used without
                    her permission in the team’s draft video and complained to the teacher. The team
                    realised  they had broken  copyright  rules by  using someone  else’s  creation  without
                    permission or credit. Their entire project was now at risk of being rejected.

                    The following week, Meera tried logging into her email but could not. Someone had
                    changed her password. Strange emails were sent from her account to teachers asking
                    for “urgent help.”
                    All four team members now had different cyber problems and the teacher paused
                    their project until everything was fixed.

                    Based on the above case, answer the following questions:

                    1.  Aarav’s device got infected because he downloaded images from                            .

                                (i)  A legal website                        (ii)  Teacher-recommended site


                              (iii)  A random unsafe website                (iv)  His school portal

                    2.  Meera’s email got hacked because she                       .

                                (i)  Used a strong password                 (ii)  Entered details on a fake page

                              (iii)  Updated her phone                      (iv)  Turned on 2FA


                    3.  Which permission did the music app NOT need?

                                (i)  Microphone                             (ii)  Storage

                              (iii)  Camera                                 (iv)  None


                    4.  Which clue in the message should have made Meera suspicious?

                    5.  What permission should Rishi have denied?

                    6.  How should the team have used Aarohi’s music correctly?
                    7.  List steps that each member should take to correct their mistakes.







                   100  Computer Science - V
   97   98   99   100   101   102