Page 62 - Cyber Safety C-7
P. 62
D. Answer the following questions:
1. Define cyberbullying.
2. List any two key signs to identify cyber threats.
3. What do you understand by IT Act, 2000?
4. Explain why cyberbullying is often considered more difficult to escape than traditional bullying.
5. Describe the three steps of the Stop–Block–Tell rule.
21 st #Critical Thinking
Century
Skills #Information Literacy
1. A student notices cyberbullying but feels scared to speak. Identify the role of the student. What right
action should he take?
2. Anjali discovers that someone has logged into her social media account and posted inappropriate
comments pretending to be her. What type of cyberbullying is this?
3. During a group project, one student notices that they are consistently left out of discussions and not
given any tasks, even though they are part of the group. The other group members make decisions
without consulting them, and the student feels ignored and unimportant. What is happening to this
student?
60 Computer Science - VII

