Page 109 - Cyber Safety C-7
P. 109

C.  Fill in the blanks using the given hints:
                    1.  Data protection is all about keeping personal and               information      Hints
                        safe.                                                                           Security
                    2.                  happens when you use someone else’s words, ideas or              Cloud
                        images and present them as your own without giving credit.                      Sensitive

                    3.  A backup copy can be stored on an external hard drive or                        Antivirus
                        storage.                                                                       Plagiarism
                    4.                  software are designed to detect, prevent and remove
                        malicious software from your devices.
                    5.  A firewall works like a strict             guard standing at the main gate.


                 D.  Answer the following questions:
                    1.  State any two key reasons for data protection.





                    2.  Explain 3-2-1 rule.






                    3.  Describe a backup in simple terms.





                    4.  Briefly describe copyright.










                    5.  Mention any two reasons why regular software updates are important.










                                                                                             21 st
                                                                                            Century   #Technology Literacy
                                                                                             Skills
                 1.   Ravi’s school project was lost after his laptop crashed. What could Ravi have done to prevent this loss?
                 2.   Aakash wants to ensure his computer is safe from viruses. What actions should Aakash take to protect
                    his computer?

                 3.   Rohan wrote a report on his research but included text copied from a book without citation. What is
                    the consequence of this action?


                                                                                                   Data Protection  107
   104   105   106   107   108   109   110   111   112   113   114