Page 119 - iPrime_V2.2_class6
P. 119

2.  An …..…………… is just like a paper greeting card.

                    3.  …..…………… is a conversation that takes place in a friendly atmosphere.

                    4.   The process of protecting computer resources such as networks, devices, programs, and
                       data from unauthorised access, damage, or attack is called …..…………… .




                  Let's Do            It                                                    Section B (Subjective)



                 A.  Short answer type questions.

                    1.  What is Phreaking?
                    2.  Define newsgroup.

                    3.  Is the use of social networking services advisable for students? Why or Why not?
                    4.  What is cloud storage?

                 B.  Long answer type questions.
                    1.  Write any four safety measures while using the Internet.

                    2.  Discuss different ways of communication through Internet.

                    3.  What is the difference between hacking and cracking?
                    4.  Define the types of cyber threats.

                 C.  Application-based questions.
                    1.   Arun, a software engineer in Gurugram, needs to transfer money urgently to
                       his parents in Varanasi because his mother is hospitalised. He’s unsure which
                       money transfer option is best for this urgent situation. What are some good
                       options and reasons for using them?

                    2.   Nishant, needing to submit his science project after the deadline, uses his father's logged-in
                       email without permission to send it to his teacher. Was this the right action? If not, what is an
                       alternative solution?
                                                                                                    Life Skills & Values
                 Higher Order Thinking Skills (HOTS)

                    1.   Why should you never meet with someone you met online without your parents'
                       permission and/or supervision? Write some of the potential risks and safety concerns
                       associated with online meetings.

                    2.   You saw your brother writing a mail to his teacher in all capital letter while submitting his
                       project work. You told him to not to use all capital letters. He asked you why. What will you
                       answer him?








                                                                              Online Surfing and Cyber Security    117
   114   115   116   117   118   119   120   121   122   123   124