Page 109 - iPlus_Ver_2.0_class_6
P. 109
• While writing an email, the person(s) whom you want should answer must be marked in the ‘To:’
field. The persons marked in the ‘Cc:’ field may or may not respond to the mail.
• Avoid using the “Reply to All” option when not necessary to answer everyone marked in the email.
• Try to overlook the minor typing mistakes made by the sender.
#Digital Literacy
Let’s CatCh Up
Write 'T' for true and 'F' for false.
a. E-banking is useful for bankers as well as customers. ...................
b. Signatures in an email should be long and complex. ...................
c. The users can access their data from anywhere by logging into their cloud
storage account. ...................
i + CYBER THREATS
Cyber threat is a criminal activity in which computers are used to damage data, steal data, or
disrupt the digital life of a person. Most of the cyber threats are carried out in order to gain
personal profit. Some people break security only to check their skills.
Types of Cyber Threats
There are various types of cyber threats. Some of them are as follows:
Data Diddling
This refers to the process of changing the data going into or out of a computer. For example, a
student breaks into his/her university’s grade recording system and changes the grades he/she
earned in the last semester or class, thus raising his/her grade point average.
Phreaking
This crime is committed against telephone companies by using computers with the goal of making
free distance calls, impersonating directory assistance or other operator services, diverting calls
to numbers of the perpetrator’s choice, or tapping phone lines.
Cloning
This refers to a fraud in which scanners are used to steal the electronic serial numbers of cellular
phones, which may be used for billing purposes and making broadcast calls. With stolen serial
numbers, clones can be made to make free calls that are billed to the owner of the original cell phone.
Carding
This refers to the process of stealing credit card numbers online, to be resold or used to charge
merchandise against the victim’s account.
Hacking
Computer hacking is the practice of modifying computer hardware and software to accomplish a
goal outside of the creator’s original purpose. People who engage in computer hacking activities
are often called hackers.
107
Online Surfing and Cybersecurity

