Page 112 - Cyber Safety C-7
P. 112

B.  Write ‘T’ for true and ‘F’ for false.

                         1.  Social media addiction has no impact on schoolwork or daily responsibilities.


                         2.  Respect is the foundation of healthy conversations.

                         3.  Never trust strangers online just because they seem polite in a chat.

                         4.   Blocking does not help you stop unwanted conversations and keeps your digital
                            space safe and comfortable.

                         5.  A virus could corrupt or delete important files.


                         6.  Backups help you save copies of your data.


                     C.  Fill in the blanks.
                         1.  When social media use becomes a habit that is hard to control, it is called          .

                         2.  Taking a planned break from apps and online platforms is called a social media
                                            .
                         3.  Spam can fill your inbox and make it harder to find              messages.
                         4.                  a chat is a gentle way to manage messages without hurting anyone’s
                            feelings or stopping communication completely.

                         5.                  happens when you use someone else’s words, ideas or images and
                            present them as your own without giving credit.
                         6.                  software are designed to detect, prevent and remove malicious software
                            from your devices.

                     D.  Answer the following questions:

                         1.  What is FOMO?
                         2.  Explain the positive and negative sides of social media.
                         3.  Differentiate between spam and phishing emails.
                         4.   Describe any three privacy settings that help protect your information.

                         5.  State any two key reasons for data protection.
                         6.  Describe a backup in simple terms.




















                   110  Computer Science - VII
   107   108   109   110   111   112   113   114