Page 136 - Cyber Safety C-8
P. 136

B.  Write ‘T’ for true and ‘F’ for false.

                        1.  Personal data includes digital information such as IP address and search history.

                        2.  When we send a message on WhatsApp, it travels openly across the Internet.

                        3.  Keylogging records every keystroke entered on a computer.


                        4.  5G networks reduce the speed at which cyberattacks spread.

                        5.  The IT Act 2000 applies only to crimes committed inside India.

                        6.  Digital signatures are legally recognised under cyber law.

                        7.  Quantum computing could break many encryption algorithms used today.


                        8.   The goal of passwordless login system is to allow access to accounts by
                            typing a password.

                     C.  Fill in the blanks.

                        1.  Encryption turns information into a               code.
                        2.  Two-Factor Authentication adds an extra layer of               .

                        3.  A password functions like a                that protects digital accounts.
                        4.  A long password should have a minimum of                  characters.

                        5.  Cyber law helps make the Internet               , fair, and trustworthy.
                        6.  Section 66E deals with violation of             .

                        7.  AI can respond to cyberattacks faster than               operators.
                        8.  Each IoT device becomes a potential                point for cybercriminals.

                     D.  Answer the following questions:

                        1.  State any two examples of personal data.
                        2.  What do you mean by protecting personal data?

                        3.  What is a strong password?

                        4.  Mention any two qualities of a strong password.
                        5.  What do you understand by Intellectual Property Rights (IPR)?

                        6.  Explain any three key areas of cyber law.
                        7.  Write about two future challenges in cybersecurity.

                        8.  Describe the role of artificial intelligence in enhancing cybersecurity.









                  134134  Computer  Science  - VIII
                        Computer Science - VIII
   131   132   133   134   135   136   137   138