Class 9 Exam  >  Class 9 Notes  >  Computer Applications for Class 9  >  Long Answer Type Questions: Cyber Safety

Long Answer Type Questions: Cyber Safety | Computer Applications for Class 9 PDF Download

Q.1. Give four methods by which you will be able to safely use a social networking site.

The following list should be followed for using the social networking safely:

  • Use a strong password. The longer it is, the more secure it will be.
  • Use a different password for each of your social networking accounts and try changing it frequently.
  • Set up your security answers which available with social networking sites.
  • If you have social networking app on your phone, be sure to password protect your device.


Q.2. What is the method of selecting a strong password?

While selecting passwords the following points are to be remembered:

  • The longer the password, the harder it is to crack. Consider a 12-character password or longer.
  • Avoid names, places, and dictionary words.
  • Mix it up. Use variations on capitalization, spelling, numbers, and punctuation.
  • You may also use a specialized Password Manager package; as ultimately the number of passwords that you need to remember will grow.


Q.3. Give four methods of identifying malicious sites.

The following are the list of malicious, criminal or inappropriate websites:

  • Check for presence of an address, phone number and/or email contact – often indications that the website is genuine. If in doubt, send an email or call to establish authenticity.
  • Check that the website’s address seems to be genuine by looking for subtle misspellings, extra words, characters or numbers or a completely different name from that you would expect the business to have.
  • Roll your mouse pointer over a link to reveal its true destination, displayed in the bottom left corner of your browser. Beware if this is different from what is displayed in the text of the link from either another website or an email.
  • If there is no padlock in the browser window or ‘https://’ at the beginning of the web address to signify that it is using a secure link, do not enter personal information on the site.Long Answer Type Questions: Cyber Safety | Computer Applications for Class 9


Q.4. What do you understand by Identity protection? Give three steps you should take to protect from theft.

Identity protection refers to the protection of personally identifiable information, such as Aadhar Card Number, Credit/Debit Card Number, bank account number, username or password by an imposter in order to impersonate someone else. Identity fraud can be used to obtain credit, merchandise and services in the name of the victim, or to provide the thief with false credentials. In addition to running up debt, in rare cases, an imposter might provide false identification topolice, creating a criminal record or leaving outstanding arrest warrants for the person whose identity has been stolen.

Some of the steps you should take to protect your identity from theft are:

  • Protect your computer and smartphone with strong, up-to-date security/anti-malware software. This is because if your computer or phone is infected with malicious software, other safeguards will be of little help.
  • The Operating System should also be regularly updated with different security patches and service packs as this will decrease the possibility of the security breach.

You should be able to spot spam and scams. Although some phishing scams are easy to identify, other phishing attempts in email, Instant Messaging, on social networking sites, or websites can look very legitimate. You should never click on a link that has been sent to you, if you have no idea about the source.


Q.5. What do you understand by confidentiality of information? State the best practices to ensure confidentiality.

Confidentiality of information is defined as information to which the public does not have general access. This policy governs the use or further disclosure of such information.

Best practices used to ensure confidentiality are as follows:

  • An authentication process, which ensures that authorized users are assigned confidential user identification and passwords. Another type of authentication is biometrics.
  • Role-based security methods may be employed to ensure user or viewer authorization. For example, data access levels may be assigned to specified department staff.
  • Access controls ensure that user actions remain within their roles. For example, if a user is authorized to read but not write data, defined system controls may be integrated.
The document Long Answer Type Questions: Cyber Safety | Computer Applications for Class 9 is a part of the Class 9 Course Computer Applications for Class 9.
All you need of Class 9 at this link: Class 9
62 videos|66 docs|14 tests

Top Courses for Class 9

FAQs on Long Answer Type Questions: Cyber Safety - Computer Applications for Class 9

1. What is cyber safety and why is it important?
Cyber safety refers to the measures and practices taken to protect individuals and their information from online threats and risks. It is important because the internet is filled with potential dangers such as cyberbullying, identity theft, and scams. Taking steps to ensure cyber safety can help individuals protect their personal information, maintain privacy, and prevent harm.
2. How can I protect myself from cyberbullying?
To protect yourself from cyberbullying, it is important to be cautious about what you share online and who you interact with. Avoid sharing personal information with strangers and be careful about the type of content you post online. If you experience cyberbullying, it is important to block the person, report the incident, and reach out to a trusted adult or authority for support.
3. What are some common signs of online scams?
Common signs of online scams include unsolicited emails or messages asking for personal or financial information, promises of large sums of money for minimal effort, requests for payment through unsecure methods, and poor grammar or spelling in the communication. If something seems too good to be true or raises suspicions, it is important to be cautious and verify the legitimacy of the offer or request.
4. How can I protect my personal information online?
To protect your personal information online, it is important to use strong and unique passwords for your accounts, enable two-factor authentication whenever possible, regularly update your software and devices, avoid clicking on suspicious links or downloading unknown files, and be cautious about the information you share on social media platforms. Additionally, it is important to be aware of phishing attempts and never share sensitive information through unsecured channels.
5. What are the dangers of sharing too much information on social media?
Sharing too much information on social media can expose individuals to various dangers. It can lead to identity theft, as personal information can be used by cybercriminals to impersonate someone or gain unauthorized access to their accounts. It can also expose individuals to cyberbullying, as sharing personal information can make it easier for others to target and harass them online. Additionally, sharing too much information can compromise privacy and expose individuals to potential physical harm if their location or daily routines are revealed. It is important to be mindful of the information shared on social media and limit the amount of personal details disclosed.
62 videos|66 docs|14 tests
Download as PDF
Explore Courses for Class 9 exam

Top Courses for Class 9

Signup for Free!
Signup to see your scores go up within 7 days! Learn & Practice with 1000+ FREE Notes, Videos & Tests.
10M+ students study on EduRev
Related Searches

ppt

,

practice quizzes

,

video lectures

,

MCQs

,

Long Answer Type Questions: Cyber Safety | Computer Applications for Class 9

,

Semester Notes

,

Viva Questions

,

mock tests for examination

,

study material

,

pdf

,

Long Answer Type Questions: Cyber Safety | Computer Applications for Class 9

,

Previous Year Questions with Solutions

,

Objective type Questions

,

Exam

,

Sample Paper

,

Important questions

,

Extra Questions

,

Summary

,

past year papers

,

Free

,

Long Answer Type Questions: Cyber Safety | Computer Applications for Class 9

,

shortcuts and tricks

;