Page 368 - Web_Application_v2.0_C12_Fb
P. 368

C.   Competency-based/Application-based questions.                                21 st  Century   #Media Literacy
                                                                                                    Skills
                  1.  You receive a direct message on social media from someone you don't know. The message claims you've won a
                    contest and asks for your personal information to claim your prize. What are some red flags in this scenario? How
                    can you verify if the contest is legitimate?                                       [CBSE Handbook]

                  2.  You see a funny meme online that makes fun of a classmate. Even though you don't agree with the message,
                    some of your friends are pressuring you to share it. How would you handle this situation and why?
                                                                                                       [CBSE Handbook]
              D.  Assertion and Reasoning questions.

                  Direction: Questions 1-2, consist of two statements – Assertion (A) and Reasoning (R). Answer these questions by
                  selecting the appropriate option given below:

                  a.  Both A and R are true and R is the correct explanation of A.
                  b.  Both A and R are true but R is not the correct explanation of A.
                 c.  A is true but R is false.
                 d.  A is false but R is true.
                 1.  Assertion (A): Antivirus software guarantees complete protection against all cyber threats.
                    Reasoning (R): Antivirus software is designed to detect and remove malware, but it cannot protect against all
                    forms of cyberattacks, such as social engineering.
                 2.  Assertion (A): Sharing personal details like your address and phone number on social media can lead to identity
                    theft.
                    Reasoning (R):  Hackers can use publicly available personal information to impersonate individuals and commit
                    fraud.

              E.  Statement-based questions.
                 Two statements are given. Statement 1 and Statement 2. Examine the statements and answer the question according
                  to the instructions given below:
                  a.  Statement 1 is True, Statement 2 is True
                 b.  Statement 1 is False, Statement 2 is False
                 c.   Statement 1 is True, Statement 2 is False
                 d.  Statement 1 is False, Statement 2 is True
                 1.  Statement 1: Installing antivirus software guarantees 100% protection from all cyber threats.
                    Statement 2: Antivirus programs help detect and remove malware.
                 2.  Statement 1: Sharing passwords with friends is a secure way to keep accounts accessible.

                    Statement 2: Passwords should never be shared with anyone.



                  LAB ACTIVITY


                  Read the blog - 25 Major Cyber Attacks in India That Shocked the Nation on the given link:

                  https://www.sattrix.com/blog/biggest-cyber-attacks-in-india/ or scan the QR code.
                  Answer the following questions:
                  1.  What lessons can be learned from the multiple cyberattacks on Indian government entities in 2024?
                  2.  What are the top 5 cyber crimes in India?
                  3.  List down the names of antivirus software. Also scan your PC to detect any threats and remove them.



                366   Touchpad Web Applications (Ver. 2.0)-XII
   363   364   365   366   367   368   369   370   371   372   373