Page 157 - Robotics and AI class 10
P. 157

•  CAPTCHA is one type of Turing Test to find out that the website which is required to be accessed is by a human or a
                    computer. In this test a person is supposed to answer a question based on the set of images displayed.
               2.  Mention some of the ways to protect from Cyber Crimes.

              Ans.  Use Authentic Internet Security and Antivirus softwares
                  •  Regularly update your softwares to the latest version.
                  •  Create strong encrypted passwords
                  •  Use your social media settings to protect unauthorised use of your personal information.
                  •   Educated everyone in the Organisation and Home about the Cyber Threats and how they can contribute to prevent
                    them.
                  •  Keep a watch on the kids, as they can become easy victims to Cyber Criminals.
                  •  Be aware of your rights and available options to fight cyber crime if you become a victim.

            C.  Competency-based/Application-based questions:                           #Digital Literacy

                  Cyberspace is a virtual environment where software, hardware, and people interact through technology. Cybersecurity
                  is crucial to protect sensitive data and prevent cyber threats in this digital realm.

                  What is cyberspace primarily characterized by?
                  a.  A physical environment with tangible objects.
                  b.  An unreal, non-physical virtual complex on the internet.

                  c.  A hybrid environment of physical and virtual elements.

                  d.  An isolated space for storing computer hardware.
              Ans.  b. An unreal, non-physical virtual complex on the internet.



                                                   Unsolved Questions


                                             SECTION A (Objective Type Questions)
                  uiz
            A.  Tick ( ) the correct option.

               1.  Identify which of the following is not an element related to cyber?
                  a.  Mobile security                                b,  Application security
                  c.  Endpoint security                              d.  Planting of trees

               2.  ………………………. are files or programs designed to harm a computer, such as Virus, Worms, Trojan horses, Spyware, etc.
                  a.  Ransomware                                     b.  Malware

                  c.  Bacteria                                       d.  Phishing
               3.  ………………………. is an act to break the security code and enter a computer system or network in an attempt to exploit
                  the information.
                  a.  Hacking                                        b.  Computing

                  c.  Frauds                                         d.  Dispute






                                                       Machine Intelligence and Cybersecurity in Computing  155
   152   153   154   155   156   157   158   159   160   161   162