Page 136 - Cyber Safety C-8
P. 136
B. Write ‘T’ for true and ‘F’ for false.
1. Personal data includes digital information such as IP address and search history.
2. When we send a message on WhatsApp, it travels openly across the Internet.
3. Keylogging records every keystroke entered on a computer.
4. 5G networks reduce the speed at which cyberattacks spread.
5. The IT Act 2000 applies only to crimes committed inside India.
6. Digital signatures are legally recognised under cyber law.
7. Quantum computing could break many encryption algorithms used today.
8. The goal of passwordless login system is to allow access to accounts by
typing a password.
C. Fill in the blanks.
1. Encryption turns information into a code.
2. Two-Factor Authentication adds an extra layer of .
3. A password functions like a that protects digital accounts.
4. A long password should have a minimum of characters.
5. Cyber law helps make the Internet , fair, and trustworthy.
6. Section 66E deals with violation of .
7. AI can respond to cyberattacks faster than operators.
8. Each IoT device becomes a potential point for cybercriminals.
D. Answer the following questions:
1. State any two examples of personal data.
2. What do you mean by protecting personal data?
3. What is a strong password?
4. Mention any two qualities of a strong password.
5. What do you understand by Intellectual Property Rights (IPR)?
6. Explain any three key areas of cyber law.
7. Write about two future challenges in cybersecurity.
8. Describe the role of artificial intelligence in enhancing cybersecurity.
134134 Computer Science - VIII
Computer Science - VIII

