Page 102 - Cyber Safety C-5
P. 102
Tara was working on the final video on her laptop. She needed to transfer files from her
phone, so she logged into her cloud storage on a school computer. She told herself she
would log out later, but she forgot. The next morning, she found a new post on her social
media account: “Check out our Ek Bharat Shreshtha Bharat Project before anyone
else!” —posted from an unknown device. As she had used the same weak password
everywhere: Tara123, someone using the school computer accessed her account and
stole her files!
During editing, Rishi added a beautiful background song he found online. It was a
melody created by a Class 7 senior, Aarohi. She noticed her song being used without
her permission in the team’s draft video and complained to the teacher. The team
realised they had broken copyright rules by using someone else’s creation without
permission or credit. Their entire project was now at risk of being rejected.
The following week, Meera tried logging into her email but could not. Someone had
changed her password. Strange emails were sent from her account to teachers asking
for “urgent help.”
All four team members now had different cyber problems and the teacher paused
their project until everything was fixed.
Based on the above case, answer the following questions:
1. Aarav’s device got infected because he downloaded images from .
(i) A legal website (ii) Teacher-recommended site
(iii) A random unsafe website (iv) His school portal
2. Meera’s email got hacked because she .
(i) Used a strong password (ii) Entered details on a fake page
(iii) Updated her phone (iv) Turned on 2FA
3. Which permission did the music app NOT need?
(i) Microphone (ii) Storage
(iii) Camera (iv) None
4. Which clue in the message should have made Meera suspicious?
5. What permission should Rishi have denied?
6. How should the team have used Aarohi’s music correctly?
7. List steps that each member should take to correct their mistakes.
100 Computer Science - V

