Page 363 - Web_Application_v2.0_C12_Fb
P. 363

4.  What is the primary purpose of backing up data?
                      i.   Preventing malware                           ii.  Avoiding phishing attacks
                      iii.  Ensuring data recovery                      iv.  Enhancing privacy settings
                     5.  Which legal mechanism protects new inventions?
                      i.   Copyright                                    ii.  Patent
                      iii.  Trademark                                   iv.  Design rights


                   Ans.  1.  iv    2.  ii    3. iii   4. iii   5. ii


                 B.  Fill in the blanks.
                    1.   ............................... is like keeping that box safe and deciding who can peek inside.
                    2.  A ............................... is a combination of atleast 8 characters with upper and lower-case letters, numbers, and special
                       characters.

                    3.  ............................... software is used to detect and remove malware from your computer systems, providing enhanced
                       protection against potential threats.

                    4.  A ............................... refers to an offensive action undertaken by cybercriminals, utilizing one or more computers to
                       target individual or multiple computers and networks.

                    5.  ............................... refers to the act of gaining unauthorized access to a computer system or network.


                   Ans.  1. Data privacy   2. strong password     3. Antivirus       4. cyber-attack   5. Hacking


                 C.  State whether the following statements are true or false.
                    1.  Inappropriate citation occurs when a source is cited incorrectly, inaccurately, or misleadingly.   .....................

                    2.  Mosaic plagiarism is also known as Direct Plagiarism.                                  .....................
                    3.  Words and symbols are a type of trademark.                                             .....................

                    4.  Customising privacy settings is not necessary for protecting your online privacy.      .....................

                    5.  Websites with HTTPS encryption provides safe communication.                            .....................

                   Ans.   1. True       2. False     3. True       4. False      5. True


                                                                Section B
                                                        (Subjective Type Questions)

                 A.  Short answer type questions.
                     1.  Explain any two methods to protect your data privacy.
                  Ans.  Two methods to protect your data privacy are:

                  Ð  Ð  Ð   Be cautious about what you share online: Carefully consider before posting, especially when it involves
                         personal information.

                  Ð  Ð  Ð   Take care when using public Wi-Fi: Avoid engaging in sensitive tasks, such as online banking, when connected
                         to public networks.
                     2.  What is Intellectual Property?
                  Ans.  Intellectual Property refers to the ideas and innovations that are the creation of an individual mind or a group of
                       minds.

                                                                                          Cyber Safety and Security  361
   358   359   360   361   362   363   364   365   366   367   368