Page 108 - Cyber Safety C-7
P. 108

A.  Tick ( ) the correct option.
                     1.  Identify the primary purpose of data protection.

                                  (i)   To protect financial data           (ii)  To keep personal information safe

                                 (iii)  To enhance Internet speed          (iv)  To improve software performance

                     2.   What should you do to keep your data safe from hackers?


                                  (i)  Use weak passwords                   (ii)  Share information online freely

                                 (iii)  Use antivirus software             (iv)  Download files from unknown sources
                     3.   What does the 3-2-1 rule for backups mean?

                                  (i)   Have 3 copies, store on 2 devices, 1 offsite

                                 (ii)   Have 3 backups on the same device


                                 (iii)  Keep 2 copies, store on 1 device

                                (iv)   Have 1 copy, no backups needed

                     4.   Which of these is an example of direct personally identifiable information (PII)?
                                  (i)   Your favourite hobby                (ii)   Your mobile number


                                 (iii)   Your favourite food               (iv)  Your school name
                     5.   Which of these is an example of plagiarism?

                                  (i)  Citing your sources correctly        (ii)  Paraphrasing with source mentioned

                                 (iii)  Using your own words               (iv)  Copying someone’s work without credit


                  B.  Write ‘T’ for true and ‘F’ for false.

                     1.  Data protection is only about stopping hackers.

                     2.  A virus could corrupt or delete important files.


                     3.  The 3-2-1 rule recommends keeping all backups in one place.

                     4.  Backups help you save copies of your data.


                     5.  A firewall checks incoming and outgoing Internet traffic.








                   106  Computer Science - VII
   103   104   105   106   107   108   109   110   111   112   113