Page 135 - Cyber Safety C-8
P. 135
test sheet - 2
Based on Chapters 4 to 7
A. Tick ( ) the correct option.
1. Personal data has become one of the most valuable resources in the .
(i) Physical world (ii) Digital world
(iii) Natural environment (iv) Offline space
2. Which of the following is considered personal data?
(i) Favourite colour (ii) Sports played
(iii) Aadhaar number (iv) Favourite food
3. Which attack depends on trying every possible combination?
(i) Dictionary attack (ii) Phishing
(iii) Social engineering (iv) Brute force attack
4. Which method may unlock systems automatically when a device is nearby?
(i) Dictionary attack (ii) Wearable & IoT authentication
(iii) Password reuse (iv) Keylogging
5. Which area of cyber law protects books, music, films, and software?
(i) Intellectual Property Rights (ii) Cybersecurity
(iii) Privacy protection (iv) Digital signatures
6. Mark the right to keep your personal details, such as photos, videos, and contact
information, private.
(i) Right to Security (ii) Right to Report
(iii) Digital Empathy (iv) Right to Privacy
7. Identify the technology that connects everyday objects like smart TVs and fitness bands.
(i) Cloud computing (ii) Internet of Things
(iii) Quantum computing (iv) Artificial Intelligence
8. Which type of computer uses qubits instead of bits?
(i) Supercomputer (ii) Cloud server
(iii) Quantum computer (iv) Edge device
Sheet
- 2
Periodic Assessment - 1 133133
Test

