Grade 9 Exam  >  Grade 9 Notes  >  Computer Science for Grade 9  >  NCERT Textbook: Cyber Safety

NCERT Textbook: Cyber Safety | Computer Science for Grade 9 PDF Download

Download, print and study this document offline
Please wait while the PDF view is loading
 Page 1


Since childhood our parents and elders have been 
guiding and suggesting us to take care of our eating 
habits, practice hygiene, be wary of strangers, 
communicate effectively and so on to ensure that we 
develop into confident, strong and positive individuals 
who are able to cope up with the competition and 
complexities of the real world. With the advent of 
Fig. 7.1: Cyber World
Digital footprint is 
the information 
about a particular 
person that exists 
on the Internet as a 
result of their online 
activity even after its 
deletion.
Safety and Security
in the Cyber World
Chapter
7
Chapter 7.indd   93 28-Feb-19   3:40:50 PM
2022-23
Page 2


Since childhood our parents and elders have been 
guiding and suggesting us to take care of our eating 
habits, practice hygiene, be wary of strangers, 
communicate effectively and so on to ensure that we 
develop into confident, strong and positive individuals 
who are able to cope up with the competition and 
complexities of the real world. With the advent of 
Fig. 7.1: Cyber World
Digital footprint is 
the information 
about a particular 
person that exists 
on the Internet as a 
result of their online 
activity even after its 
deletion.
Safety and Security
in the Cyber World
Chapter
7
Chapter 7.indd   93 28-Feb-19   3:40:50 PM
2022-23
  
Internet, all of us have also become a part of a cyber 
world wherein we share and access resources, connect 
and interact with many people. Just like real world we 
need to be cautious and alert while working in this cyber 
world as well.
Email is used to send and receive information and 
messages but one needs to be careful while using email 
as many a times one may find emails which are from 
unknown source saying that you are a lucky winner 
or asking you to provide personal information. These 
mails will tempt you to follow the instructions written 
in the contents of the mail. Such emails are called spam 
mails and are sent with malicious intent to get you  
into trouble.
Let’s look at some of the examples of spam mails.
Fig. 7.2 : Sample email-1
Chapter 7.indd   94 7/20/2020   11:23:04 AM
2022-23
Page 3


Since childhood our parents and elders have been 
guiding and suggesting us to take care of our eating 
habits, practice hygiene, be wary of strangers, 
communicate effectively and so on to ensure that we 
develop into confident, strong and positive individuals 
who are able to cope up with the competition and 
complexities of the real world. With the advent of 
Fig. 7.1: Cyber World
Digital footprint is 
the information 
about a particular 
person that exists 
on the Internet as a 
result of their online 
activity even after its 
deletion.
Safety and Security
in the Cyber World
Chapter
7
Chapter 7.indd   93 28-Feb-19   3:40:50 PM
2022-23
  
Internet, all of us have also become a part of a cyber 
world wherein we share and access resources, connect 
and interact with many people. Just like real world we 
need to be cautious and alert while working in this cyber 
world as well.
Email is used to send and receive information and 
messages but one needs to be careful while using email 
as many a times one may find emails which are from 
unknown source saying that you are a lucky winner 
or asking you to provide personal information. These 
mails will tempt you to follow the instructions written 
in the contents of the mail. Such emails are called spam 
mails and are sent with malicious intent to get you  
into trouble.
Let’s look at some of the examples of spam mails.
Fig. 7.2 : Sample email-1
Chapter 7.indd   94 7/20/2020   11:23:04 AM
2022-23
Sa f e t y a n d Se c u r i t y i n t h e c y b e r Wo r l d In the Fig. 7.2 given above, you can find some common 
signals that you would usually find in a spam email.
Assume there is another email in your inbox asking you 
to download a popular game for free which otherwise 
costs `3,500/- as shown in Fig. 7.3.
Activity 1
In the Fig. 7.3 given above, which one of the following 
proves that it is a fake email? Choose the option from 
the list given below.
• The offer is valid only for the next 48 hours.
• Incorrect spelling of FIFA in the email ID in ‘From’ 
Box.
• The cost of the game mentioned in the mail is not 
correct.
Assume there is another email in your inbox which 
contains links asking you to provide account details 
for verification purpose. If you click on such links or 
download any attachments, they may lead you to a 
phishing website or install harmful malware (malicious 
software) on your device, as shown in Fig. 7.4.
Fig. 7.3: Sample email-2
Chapter 7.indd   95 7/20/2020   11:23:04 AM
2022-23
Page 4


Since childhood our parents and elders have been 
guiding and suggesting us to take care of our eating 
habits, practice hygiene, be wary of strangers, 
communicate effectively and so on to ensure that we 
develop into confident, strong and positive individuals 
who are able to cope up with the competition and 
complexities of the real world. With the advent of 
Fig. 7.1: Cyber World
Digital footprint is 
the information 
about a particular 
person that exists 
on the Internet as a 
result of their online 
activity even after its 
deletion.
Safety and Security
in the Cyber World
Chapter
7
Chapter 7.indd   93 28-Feb-19   3:40:50 PM
2022-23
  
Internet, all of us have also become a part of a cyber 
world wherein we share and access resources, connect 
and interact with many people. Just like real world we 
need to be cautious and alert while working in this cyber 
world as well.
Email is used to send and receive information and 
messages but one needs to be careful while using email 
as many a times one may find emails which are from 
unknown source saying that you are a lucky winner 
or asking you to provide personal information. These 
mails will tempt you to follow the instructions written 
in the contents of the mail. Such emails are called spam 
mails and are sent with malicious intent to get you  
into trouble.
Let’s look at some of the examples of spam mails.
Fig. 7.2 : Sample email-1
Chapter 7.indd   94 7/20/2020   11:23:04 AM
2022-23
Sa f e t y a n d Se c u r i t y i n t h e c y b e r Wo r l d In the Fig. 7.2 given above, you can find some common 
signals that you would usually find in a spam email.
Assume there is another email in your inbox asking you 
to download a popular game for free which otherwise 
costs `3,500/- as shown in Fig. 7.3.
Activity 1
In the Fig. 7.3 given above, which one of the following 
proves that it is a fake email? Choose the option from 
the list given below.
• The offer is valid only for the next 48 hours.
• Incorrect spelling of FIFA in the email ID in ‘From’ 
Box.
• The cost of the game mentioned in the mail is not 
correct.
Assume there is another email in your inbox which 
contains links asking you to provide account details 
for verification purpose. If you click on such links or 
download any attachments, they may lead you to a 
phishing website or install harmful malware (malicious 
software) on your device, as shown in Fig. 7.4.
Fig. 7.3: Sample email-2
Chapter 7.indd   95 7/20/2020   11:23:04 AM
2022-23
Phishing is an 
attempt to obtain 
sensitive information 
such as username, 
password and credit 
card details etc. for 
malicious reasons, 
by  osing as a 
trustworthy source in 
email.
Fig. 7.4: Sample email-3
Activity 2
Identify the URL(s) which are indicative of a fake 
website?
http://www.uiidai.gov.in/
http://www.incometakindiaefilling.gov.in/
https://onlinesbi.com
The above scenarios are examples of fraudulent emails. 
You need to be cautious before proceeding with any of 
the instructions given in the email.
Chapter 7.indd   96 28-Feb-19   3:40:51 PM
2022-23
Page 5


Since childhood our parents and elders have been 
guiding and suggesting us to take care of our eating 
habits, practice hygiene, be wary of strangers, 
communicate effectively and so on to ensure that we 
develop into confident, strong and positive individuals 
who are able to cope up with the competition and 
complexities of the real world. With the advent of 
Fig. 7.1: Cyber World
Digital footprint is 
the information 
about a particular 
person that exists 
on the Internet as a 
result of their online 
activity even after its 
deletion.
Safety and Security
in the Cyber World
Chapter
7
Chapter 7.indd   93 28-Feb-19   3:40:50 PM
2022-23
  
Internet, all of us have also become a part of a cyber 
world wherein we share and access resources, connect 
and interact with many people. Just like real world we 
need to be cautious and alert while working in this cyber 
world as well.
Email is used to send and receive information and 
messages but one needs to be careful while using email 
as many a times one may find emails which are from 
unknown source saying that you are a lucky winner 
or asking you to provide personal information. These 
mails will tempt you to follow the instructions written 
in the contents of the mail. Such emails are called spam 
mails and are sent with malicious intent to get you  
into trouble.
Let’s look at some of the examples of spam mails.
Fig. 7.2 : Sample email-1
Chapter 7.indd   94 7/20/2020   11:23:04 AM
2022-23
Sa f e t y a n d Se c u r i t y i n t h e c y b e r Wo r l d In the Fig. 7.2 given above, you can find some common 
signals that you would usually find in a spam email.
Assume there is another email in your inbox asking you 
to download a popular game for free which otherwise 
costs `3,500/- as shown in Fig. 7.3.
Activity 1
In the Fig. 7.3 given above, which one of the following 
proves that it is a fake email? Choose the option from 
the list given below.
• The offer is valid only for the next 48 hours.
• Incorrect spelling of FIFA in the email ID in ‘From’ 
Box.
• The cost of the game mentioned in the mail is not 
correct.
Assume there is another email in your inbox which 
contains links asking you to provide account details 
for verification purpose. If you click on such links or 
download any attachments, they may lead you to a 
phishing website or install harmful malware (malicious 
software) on your device, as shown in Fig. 7.4.
Fig. 7.3: Sample email-2
Chapter 7.indd   95 7/20/2020   11:23:04 AM
2022-23
Phishing is an 
attempt to obtain 
sensitive information 
such as username, 
password and credit 
card details etc. for 
malicious reasons, 
by  osing as a 
trustworthy source in 
email.
Fig. 7.4: Sample email-3
Activity 2
Identify the URL(s) which are indicative of a fake 
website?
http://www.uiidai.gov.in/
http://www.incometakindiaefilling.gov.in/
https://onlinesbi.com
The above scenarios are examples of fraudulent emails. 
You need to be cautious before proceeding with any of 
the instructions given in the email.
Chapter 7.indd   96 28-Feb-19   3:40:51 PM
2022-23
Sa f e t y a n d Se c u r i t y i n t h e c y b e r Wo r l d Protection from email fraud
• Do not reply to emails from unknown senders even if 
it looks like a genuine email.
• Do not provide personal information like name, date 
of birth, school name, address, parent’s names or any 
other information. 
• Do not fall for lucrative offers/discounts as they might 
be coming from unknown source and it may not be 
reliable. Ignore/delete those mails. 
• Do not open attachments or click on links from 
unknown senders, since they may contain 
malicious files that might affect your device. Only 
click the links and downloads from websites that 
you trust.
• Beware of phishing websites — check the URL to 
confirm if the website is secure.
• Do not forward spam or suspicious emails to others.
• Do not send excessive forwards as it might be 
distracting to the receiver.
You have learnt how to use email for sharing information 
and what safety precautions to be taken while using 
email. Through email you can reach out to people only 
if you have their email ID.
Activity 3
Can you think of ways to share your event with a larger 
audience?
The Internet allows us to exchange and share   
information, connect with people online across the 
world and create our own networks through social  
networking sites.
In order to create an account on a social networking site 
you need to use your email ID as username.
Chapter 7.indd   97 28-Feb-19   3:40:51 PM
2022-23
Read More
51 videos|44 docs|9 tests

Top Courses for Grade 9

51 videos|44 docs|9 tests
Download as PDF
Explore Courses for Grade 9 exam

Top Courses for Grade 9

Signup for Free!
Signup to see your scores go up within 7 days! Learn & Practice with 1000+ FREE Notes, Videos & Tests.
10M+ students study on EduRev
Related Searches

ppt

,

mock tests for examination

,

Semester Notes

,

MCQs

,

Previous Year Questions with Solutions

,

practice quizzes

,

NCERT Textbook: Cyber Safety | Computer Science for Grade 9

,

Summary

,

Extra Questions

,

Important questions

,

study material

,

NCERT Textbook: Cyber Safety | Computer Science for Grade 9

,

Exam

,

NCERT Textbook: Cyber Safety | Computer Science for Grade 9

,

shortcuts and tricks

,

Sample Paper

,

past year papers

,

pdf

,

Free

,

video lectures

,

Viva Questions

,

Objective type Questions

;