Q1. Name the three types of information collected by a social networking site.
Ans: The three types of information collected by a social networking site are
Q2. What is Pharming?
Ans: Pharming refers to the fraudulent practice of directing Internet users to a bogus website that mimics the appearance of a legitimate one, to obtain personal information such as passwords, account numbers, etc.
Q3. What is Cyberstalking?
Ans: Cyberstalking is a crime in which the attacker harasses a victim using electronic communication, such as e-mail or instant messaging (IM), or messages posted to a social networking site and chat site. A cyberstalker, using anonymity allows them to stalk their victim without being detected.
Q4. State two methods by which you can detect a virus.
Ans: Following are some of the ways your computer reacts to viruses:
Q5. State three points that you should remember while selecting a password.
Ans: While selecting passwords the following points are to be remembered:
Q6. List two methods by which you will be able to identify malicious websites.
Ans: The following is the list of malicious, criminal or inappropriate websites:
Q7. What Is Malware?
Ans: Malware or malicious software is the aggregate term for a type of program that is deliberately designed to cause harm to the computer system, server system, user's computer, or computer network. Malware includes viruses, ransomware, spyware, worms, Trojan horses, adware, rogue software, and scareware. Malware is generally delivered as a link or file over email and requires the user to tap on the link or open the file to execute the malware.
Q8. What is Identity Protection?
Ans: Identity Safety is the strategies you practice to ensure that the personal data that makes up your web or genuine self is secured and not taken so others may mimic you in any capacity whatsoever (access to your financial balances, creating online profiles using your name on it, and so on).
62 videos|66 docs|14 tests
|
1. What is cyber safety and why is it important for students? |
2. What are some common cyber threats that students may face? |
3. How can students protect their personal information online? |
4. What steps should students take if they experience cyberbullying? |
5. Why is it essential to educate students about digital footprints? |
|
Explore Courses for Class 9 exam
|