Page 367 - Web_Application_v2.0_C12_Fb
P. 367
5. What are some things you can do to create strong passwords? [CBSE Handbook]
i. Use the same password for all your online accounts.
ii. Use short passwords that are easy to remember.
iii. Use a combination of uppercase and lowercase letters, numbers, and symbols.
iv. All of these
B. Fill in the blanks.
1. ............................... theft is when someone uses your personal data to impersonate you, typically to steal from you.
[CBSE Handbook]
2. In ..............................., the email is received from a forged email address but it appears to be from some authentic
source. [CBSE Handbook]
3. ............................... is a type of cybercrime that uses the internet and technology to harass or stalk a person.
[CBSE Handbook]
4. ............................... is used for protecting different literary works such as different codes of computer programs,
databases, novels, poems, musical compositions, etc.
5. ............................... is the act of copying someone else’s work and publishing and pretending as if it is one’s own work.
C. State whether the following statements are true or false.
1. Using open Wi-Fi networks does not affect the security of your communication. .....................
2. The Information Technology Act, 2000 (IT Act) is the primary regulation governing cyber laws
in India. .....................
3. The Bharatiya Nyaya Sanhita (BNS) replaced the Indian Penal Code (IPC) on December 25, 2023. .....................
4. Manual comparison is an ineffective method for detecting plagiarism. .....................
5. The Bharatiya Nyaya Sanhita (BNS) consists of 20 chapters. .....................
Section B
(Subjective Type Questions)
A. Short answer type questions.
1. Describe the importance of responsible online behaviour and how cyber laws contribute to it. [CBSE Handbook]
2. Write the difference between cyberbullying and cyberstalking.
3. Identify an object or concept in your daily life that would be protected by each of the following:
a. Patent b. Copyright c. Trademark [CBSE Handbook]
4. Write any two security measures.
5. What right does a copyright grant the owner?
B. Long answer type questions.
1. List some security measures that should be followed to be safe from the dreadful act of cyber-crime.
[CBSE Handbook]
2. What is the key difference between a patent and a copyright? [CBSE Handbook]
3. Write the key features of DoS attacks.
4. Define Email Spoofing.
5. What is DoS Attack?
Cyber Safety and Security 365

