Page 64 - Cyber Safety C-8
P. 64

B.  Write ‘T’ for true and ‘F’ for false.

                        1.   Students rely on online platforms for assignments, virtual classrooms, digital
                            libraries, and communication tools.

                        2.  Integrity means information can be changed anytime by anyone.

                        3.  It is acceptable to share someone’s photos online without permission.


                        4.  A digital footprint can be either positive or negative.

                        5.  Zero-day threats use vulnerabilities that have already been fixed by developers.

                        6.  A message asking for an OTP cannot be a cyber threat.


                        7.  Free public Wi-Fi is safe for banking and academic work.

                     C.  Fill in the blanks.
                        1.  Students and professionals depend on                 services for online meetings and

                            storage.
                        2.   A digital footprint includes search history, location data, photos and
                            interaction.

                        3.   Personal information such as name, address, photos, phone number, and passwords must
                            be kept                .
                        4.   Digital  responsibilities  guide  us on how we should               while using digital
                            technology.

                        5.  If laptops, mobile phones, or pen drives containing important data go missing, criminals can
                                            the information.
                        6.  FOMO happens when someone thinks they are                    out.


                        7.                  attackers trick people into revealing important information by pretending
                            to be trusted individuals.

                     D.  Answer the following questions:
                        1.  Why has a global shift from offline to online systems created a need for cybersecurity?

                        2.  Explain the CIA Triad.

                        3.  Write any two key aspects of digital respect.
                        4.  Briefly explain the term FOMO.

                        5.  Explain any two cyber safety steps against cyber attacks.

                        6.  Why is secure Wi-Fi important when performing important online tasks?
                        7.   What is digital citizenship?




                                       - VIII
                   62   Computer Science - VIII
                                 Science
                        Computer
                   62
   59   60   61   62   63   64   65   66   67   68   69