Page 119 - iPrime_V2.2_class6
P. 119
2. An …..…………… is just like a paper greeting card.
3. …..…………… is a conversation that takes place in a friendly atmosphere.
4. The process of protecting computer resources such as networks, devices, programs, and
data from unauthorised access, damage, or attack is called …..…………… .
Let's Do It Section B (Subjective)
A. Short answer type questions.
1. What is Phreaking?
2. Define newsgroup.
3. Is the use of social networking services advisable for students? Why or Why not?
4. What is cloud storage?
B. Long answer type questions.
1. Write any four safety measures while using the Internet.
2. Discuss different ways of communication through Internet.
3. What is the difference between hacking and cracking?
4. Define the types of cyber threats.
C. Application-based questions.
1. Arun, a software engineer in Gurugram, needs to transfer money urgently to
his parents in Varanasi because his mother is hospitalised. He’s unsure which
money transfer option is best for this urgent situation. What are some good
options and reasons for using them?
2. Nishant, needing to submit his science project after the deadline, uses his father's logged-in
email without permission to send it to his teacher. Was this the right action? If not, what is an
alternative solution?
Life Skills & Values
Higher Order Thinking Skills (HOTS)
1. Why should you never meet with someone you met online without your parents'
permission and/or supervision? Write some of the potential risks and safety concerns
associated with online meetings.
2. You saw your brother writing a mail to his teacher in all capital letter while submitting his
project work. You told him to not to use all capital letters. He asked you why. What will you
answer him?
Online Surfing and Cyber Security 117

