Unit-2 CYBER-SAFETY |
Class
-IX |
All Important
Questions Answers |
All 2,3,4 marks Question in One Video |
Short Question Answer:-
1.
What do you mean by cyber safety?
Ans.
Cyber - safety generally refers to a set of discipline, measures and actions
taken to protect personal information and your computer from attacks. It also
involves the practice to respect others ' information privacy and not to
indulge knowingly in divulging any information not meant for unauthorized
entities.
2.
What is Cyberstalking?
Ans.
Cyberstalking is a crime in which someone harasses or stalks a victim
using electronic or digital means, such as social media, email, instant
messaging (IM), or messages posted to a discussion group or forum.
3.
What is privacy?
Ans.
Privacy is the ability of an individual or group to seclude themselves or
information about themselves, and thereby express themselves selectively.
4.
What is an IP address?
Ans.
IP address is the most basic way of identifying a user's device. IP address is
a unique identification allocated to each device over a network. In turn, IP
address of user's device identifies that user on the Internet. A website can
determine rough geographical location of the user from the IP address.
5.
How are we tracked by cookies while surfing Internet?
Ans . Cookies is
the most traditional and common way to track information about us such as
website visiting time , duration and frequency , products added in the shopping
cart while online shopping , data entered into form - fields like name ,
address , and passwords etc. Later, on next visit of the user such information
is extracted from the cookies created during last visit on user's computer. Cookies
are stored as small piece of information usually in plain text form.
6.
What is an antivirus software?
Ans.
Antivirus is a kind of software used to prevent, scan, detect and delete
viruses from a computer. Once installed, most antivirus software runs automatically
in the background to provide real-time protection against virus attacks.
7.
How does a spyware performs eavesdropping on our computer system?
Ans
. Spyware installs itself on the computer without user's knowledge and monitors
keystrokes, takes screenshots, reads chat, collects devise and user information
and forwards it to the malicious owners of such program.
8.
What is a firewall?
Ans . A firewall is a security combination of
hardware and software that is used to protect a server and network resources
from unauthorized access and intrusion. Firewall checks the incoming data
packets over the networks and filters out which do not have suitable and
sufficient permission to access the network.
9.
Explain Adware.
Ans.
Adware is a form of malware that hides on your device and serves you
advertisements. Some adware also monitors your behavior online so it can target
you with specific ads.
10.
Briefly describe two threats for
children over Internet .
Ans . 1. Online predators easily find children
online whose minds can be lured into any unethical activity through games ,
live video chat , mind affecting videos and music etc.
Cyber
- bullying involves any sort of threat , or harassment over internet in the
form of undesired messages in bad taste and intentions , online mockery in
friend groups or circles , stalking someone's online profile and trying to post
unwanted updates , sending unsolicited private messages , videos , and pictures
.
11.
Explain online identity theft.
Ans.
Any digital identity theft definition includes a malicious actor that illegally
acquires personal information (date of birth, social security number, credit
card details etc.) and uses it for identity fraud (cloning credit cards,
applying for loans, extorting the victim etc.).
Long
Question Answer:-
12.
Give four methods by which you will be able to safely use a social networking
site.
Ans.
The following list should be followed for using the social networking safely:
•
Use a strong password. The longer it is, the more secure it will be.
•
Use a different password for each of your social networking accounts and try
changing it frequently.
•
Set up your security answers which available with social networking sites.
•
If you have social networking app on your phone, be sure to password protect
your device.
13.
Write the safety rule of social median.
Ans.
Tips to stay safe on social media :
· Use
a strong password. The longer it is, the more secure it will be.
· Use
a different password for each of your social media accounts.
· Set
up your security answers.
· If
you have social media apps on your phone, protect your device with strong
password.
· Be
selective with friend requests. If you don’t know the person, don’t accept
their request. It could be a fake account.
· Be
careful about what you share. Don’t reveal sensitive personal information i.e.
home address, financial information, phone number.
· Become
familiar with the privacy policies of the social media channels you use and
customize your privacy settings to control who sees what.
· Protect
your computer by installing antivirus software to safeguard. Also ensure that
your browser, operating system, and software are kept up to date.
· Remember
to log off when you’re done.
14.
What is the method of selecting a strong password?
Ans.
While selecting passwords the following points are to be remembered:
•
The longer the password, the harder it is to crack. Consider a 12-character
password or longer.
•
Avoid names, places, and dictionary words.
•
Mix it up. Use variations on capitalization, spelling, numbers, and
punctuation.
•
You may also use a specialized Password Manager package; as ultimately the
number of passwords that you need to remember will grow.
15.
State two methods by which you can detect a virus.
Ans.
Following are some of the ways your computer reacts to viruses:
•
The speed of your computer may go down to a considerable extent.
•
Certain software may require more time to start than it does usually.
•
Certain software may not start at all.
•
Some software may start normally but closes down abruptly
16.
How can you safely browse the web?
Ans.
Safe Internet Browsing Tips :
1. Install
and use most secure Internet Browser like (Google Chrome, Mozilla Firefox).
2. Customise
your security settings like ( shutting off features like “auto fill”, turning
off “cookies”, block pop-up windows)
3. Create
typical password which cannot be recognized by others.
4. Hide
your IP (Internet Protocol) with a VPN (Virtual Private Network)
5. Download
software from trusted sources.
6. Use
Anti-Virus protection
7. Be
prompt about updating your operating system and software
8. Don’t
use unsecure Wi-Fi.
9. Back
up your data.
17.
Define the following terms.
a)
Cyber bullying
The
use of electronic communication to bully a person, typically by sending messages
of an intimidating or threatening nature.
b)
Cyber Stalking
Cyberstalking
is a crime in which someone harasses or stalks a victim using electronic
or digital means, such as social media, email, instant messaging (IM), or
messages posted to a discussion group or forum.
c)
Malware
“Malware”
is short for malicious software and used as a single term to refer to virus,
spy ware, worm etc. Malware is designed to cause damage to a stand-alone
computer or a net worked PC. So wherever a malware term is used it means a
program which is designed to damage your computer it may be a virus, worm or
Trojan horse.
d)
Trojan Horse
Trojans
are the malicious programs that are promoted as useful utilities or software
and , once installed , affect the computer system and files .
e)
Virus
Viruses
are malicious codes that attach themselves with program files and corrupt them.
They destroy useful data, format or corrupt data storage and eventually render
entire computer system useless
f)
Worm
Worms
are malicious programs that make copies of themselves again and again on the
local drive, network shares, etc. The only purpose of the worm is to reproduce
itself again and again.
e)
Spam
Spam
email is unsolicited and unwanted junk email sent out in bulk to an
indiscriminate recipient list. Typically, spam is sent for commercial purposes.
It can be sent in massive volume by botnets, networks of infected computers.
THANK
YOU
0 Comments
Post a Comment