Page 102 - TP_Prime_V2.2_Class7
P. 102
Mind Drill
Rapid Fire
Prime (Ver. 2.2)-VII 1. Tick ( ) the correct option. (ii) Digital Dossier CYBER SAFETY
a. A Digital Footprint is also known as _______________.
(i) Digital Diary
(iv) DigiLocker
(iii) Database
b. Why do hackers break into the other’s computer system?
100 (i) To steal important data (ii) To destroy the system 101
(iii) Both (i) and (ii) (iv) None of these
c. When the electronic devices are used to harass or embarrass other person then it is called
as _______________.
(i) Hacking (ii) Spamming
(iii) Cyber bullying (iv) Social Networking
d. Which of the following statements is incorrect in context of Plagiarism?
(i) We can copy the content written by someone without his/her permission.
(ii) We can copy the content written by someone by taking his/her permission.
(iii) We can copy the content written by someone by giving citation.
(iv) We need to rephrase the content after copying.
2. Write ‘T’ for true and ‘F’ for false.
a. A Digital Footprint is an impression a user leaves while using
the Internet. ________
b. Always upload inappropriate content online. ________
c. Keep your privacy settings always off. ________
d. We should not use the content written by others without his permission. ________
e. We cannot delete the browsing history of a browser. ________

