Page 64 - Cyber Safety C-8
P. 64
B. Write ‘T’ for true and ‘F’ for false.
1. Students rely on online platforms for assignments, virtual classrooms, digital
libraries, and communication tools.
2. Integrity means information can be changed anytime by anyone.
3. It is acceptable to share someone’s photos online without permission.
4. A digital footprint can be either positive or negative.
5. Zero-day threats use vulnerabilities that have already been fixed by developers.
6. A message asking for an OTP cannot be a cyber threat.
7. Free public Wi-Fi is safe for banking and academic work.
C. Fill in the blanks.
1. Students and professionals depend on services for online meetings and
storage.
2. A digital footprint includes search history, location data, photos and
interaction.
3. Personal information such as name, address, photos, phone number, and passwords must
be kept .
4. Digital responsibilities guide us on how we should while using digital
technology.
5. If laptops, mobile phones, or pen drives containing important data go missing, criminals can
the information.
6. FOMO happens when someone thinks they are out.
7. attackers trick people into revealing important information by pretending
to be trusted individuals.
D. Answer the following questions:
1. Why has a global shift from offline to online systems created a need for cybersecurity?
2. Explain the CIA Triad.
3. Write any two key aspects of digital respect.
4. Briefly explain the term FOMO.
5. Explain any two cyber safety steps against cyber attacks.
6. Why is secure Wi-Fi important when performing important online tasks?
7. What is digital citizenship?
- VIII
62 Computer Science - VIII
Science
Computer
62

