Page 61 - Cyber Safety C-7
P. 61
3. Select the term that refers to the act of publicly sharing someone’s private, sensitive information
without their consent to cause harm or embarrassment.
(i) Doxxing (ii) Trolling
(iii) Impersonation (iv) Exclusion
4. Which feature makes cyberbullying harder to escape than traditional bullying?
(i) Limited audience
(ii) Happens only at school
(iii) Can happen anytime and in many online spaces
(iv) Requires physical presence
5. Identify the term used for the person or group carrying out the bullying.
(i) The Victim (ii) The Aggressor
(iii) The Bystander (iv) The Upstander
B. Write ‘T’ for true and ‘F’ for false.
1. Use strong, unique passwords for all your accounts and turn on Two-Factor Authentication
(2FA) whenever possible.
2. Cyberbullying happens only in schools and playgrounds.
3. The Stop–Block–Tell rule encourages reacting in anger.
4. Victims may experience feelings of sadness, anxiety and depression.
5. Being an upstander means choosing to step in and help in a positive way.
C. Fill in the blanks using the given hints:
1. A profile is a social media account made with false or stolen Hints
information.
1930
2. Cyberbullying primarily relies on two key factors i.e., tactics used by the bully Impersonation
and the role of . Cyberstalking
Fake
3. Pretending to be someone else online to cause harm is called .
Anonymity
4. A serious and often illegal form of repeated online harassment that makes the
victim fear for their safety, is called .
5. The toll-free cybercrime helpline number in India is .
Cyberbullying—Recognising and Responding 59

