Page 76 - Cyber Safety C-8
P. 76

3.  Which practice helps prevent strangers from viewing personal content?

                                  (i)  Public profiles                      (ii)  Clicking unknown links

                                 (iii)  Ignoring updates                   (iv)  Limited sharing

                     4.  Privacy refers to the right of individuals to control how their personal information is      .
                                  (i)  Collected, stored, and used          (ii)  Deleted


                                 (iii)  Advertised                         (iv)  Uploaded publicly
                     5.  Identify the option that collects search history, watch history, location history, and browsing
                         activity across devices.

                                  (i)  Google accounts                      (ii)  WhatsApp

                                 (iii)  Social media                       (iv)  None of these


                  B.  Write ‘T’ for true and ‘F’ for false.

                     1.  Personal data includes digital information such as IP address and search history.

                     2.  When we send a message on WhatsApp, it travels openly across the Internet.

                     3.  Strong privacy settings reduce the chances of cyberbullying and online stalking.

                     4.  Encryption allows everyone on the Internet to read the message easily.

                     5.  Protecting personal data is an essential part of staying safe in the digital world.


                  C.  Fill in the blanks using the given hints:
                     1.  In today's digital world, personal data has become one of the most               Hints
                                         resources.                                                       secret
                     2.  Strong passwords, private accounts, and limited sharing prevent strangers       security
                         from viewing                 content.
                                                                                                         personal
                     3.  Encryption turns information into a               code.
                                                                                                       Social media
                     4.  Two-Factor Authentication adds an extra layer of               .                valuable

                     5.                  platforms allow choosing who can see profiles, posts, and
                         personal information.


                  D.  Answer the following questions:
                     1.  State any two examples of personal data.





                     2.  What do you mean by protecting personal data?








                   74   Computer Science - VIII
   71   72   73   74   75   76   77   78   79   80   81