Page 102 - TP_Prime_V2.2_Class7
P. 102

Mind Drill








                      Rapid Fire
           Prime (Ver. 2.2)-VII  1.  Tick ( ) the correct option.      (ii)   Digital Dossier                                                                                                                                                           CYBER SAFETY




                      a.  A Digital Footprint is also known as _______________.

                         (i)   Digital Diary

                                                                       (iv)  DigiLocker
                         (iii)  Database

                       b.  Why do hackers break into the other’s computer system?

          100            (i)   To steal important data                 (ii)   To destroy the system                                                                                                                                                  101

                         (iii)  Both (i) and (ii)                      (iv)  None of these

                      c.   When the electronic devices are used to harass or embarrass other person then it is called
                         as _______________.

                         (i)   Hacking                                 (ii)   Spamming

                         (iii)  Cyber bullying                         (iv)  Social Networking

                      d.  Which of the following statements is incorrect in context of Plagiarism?

                         (i)  We can copy the content written by someone without his/her permission.

                         (ii)   We can copy the content written by someone by taking his/her permission.

                         (iii)  We can copy the content written by someone by giving citation.

                         (iv)  We need to rephrase the content after copying.

                  2.  Write ‘T’ for true and ‘F’ for false.
                      a.   A Digital Footprint is an impression a user leaves while using

                         the Internet.                                                                      ________

                      b.  Always upload inappropriate content online.                                       ________

                      c.  Keep your privacy settings always off.                                            ________


                      d.  We should not use the content written by others without his permission.           ________

                      e.  We cannot delete the browsing history of a browser.                               ________
   97   98   99   100   101   102   103   104   105   106   107