Page 62 - Cyber Safety C-7
P. 62

D.  Answer the following questions:
                     1.  Define cyberbullying.







                     2.  List any two key signs to identify cyber threats.










                     3.  What do you understand by IT Act, 2000?










                     4.  Explain why cyberbullying is often considered more difficult to escape than traditional bullying.









                     5.  Describe the three steps of the Stop–Block–Tell rule.













                                                                                              21 st   #Critical Thinking
                                                                                             Century
                                                                                              Skills  #Information Literacy
                  1.  A student notices cyberbullying but feels scared to speak. Identify the role of the student. What right
                     action should he take?
                  2.  Anjali discovers that someone has logged into her social media account and posted inappropriate
                     comments pretending to be her. What type of cyberbullying is this?

                  3.  During a group project, one student notices that they are consistently left out of discussions and not
                     given any tasks, even though they are part of the group. The other group members make decisions
                     without consulting them, and the student feels ignored and unimportant. What is happening to this
                     student?






                   60   Computer Science - VII
   57   58   59   60   61   62   63   64   65   66   67