Unit 7: Cyber Security
Reading II
Cyber Security: Basic Internet Safety Tips (Page
110)
A.
Match the words given below with their meanings.
a. possession i. to prevent something bad from happening
b. intertwined ii. quick to detect
or respond to slight changes or signals
c. integration iii. an act of
buying or selling; deal
d. avoid iv. protecting something from danger or harm
e. sensitive v. something that you own or have with you;
belongingness
f. proliferated vi. the act of proving that something is real
or true
g. shielding vii. the act of combining two or more things
together
h. promptly viii. closely connected with somebody or something
i. authentication ix. increased
rapidly in number or amount
j. transaction x. without any
delay
Answer:
a.
possession v. something that
you own or have with you; belongingness
b.
intertwined viii. closely
connected with somebody or something
c.
integration vii. the act of
combining two or more things together
d.
avoid i.
to prevent something bad from happening
e.
sensitive ii. quick to
detect or respond to slight changes or signals
f.
proliferated ix. increased
rapidly in number or amount
g.
shielding iv. protecting
something from danger or harm
h.
promptly x.
without any delay
i.
authentication vi. the act of
proving that something is real or true
j.
transaction iii. an act of buying or selling; deal
B.
State whether the following statements are true or false.
a. It is a good idea to use the
same password in different accounts for safety purpose.
b. The teenagers are more
vulnerable than any other age groups regarding the internet safety.
c. It is not safe to let the
computer remember our passwords.
d. A cheap debit card is safer
than the expensive one.
e. It is not safe to enable auto
update of software in our devices.
f. We should never enter our
financial details on websites.
Answer:
a. It
is a good idea to use the same password in different accounts for safety
purpose. False
b. The
teenagers are more vulnerable than any other age groups regarding the internet
safety. False
c. It
is not safe to let the computer remember our passwords. True
d. A
cheap debit card is safer than the expensive one. False
e. It
is not safe to enable auto update of software in our devices. False
f. We
should never enter our financial details on websites. True
C.
Read the following paragraph headings and write the correct paragraph name
(A-H) against them.
a. Keep your Personal Data Safe
b. Keep Personal Information
Private
c. Set up Two-factor
Authentication
d. Make Sure your Devices are
Secure
e. Be Careful about WiFi
f. Pay Attention to Software
Updates
g. Back up your Personal Data
h. Protect your Personal
Information with Strong Passwords
Answer:
A h. Protect your Personal Information with Strong
Passwords
B a. Keep your Personal Data Safe
C c. Set up Two-factor Authentication
D f. Pay Attention to Software Updates
E e. Be Careful about WiFi
F c. Set up Two-factor Authentication
G b. Keep Personal Information Private
H g. Back up your Personal Data
D.
Answer these questions.
a. How do we try to protect our
physical property?
b. What should we do to keep our
passwords secret?
c. Mention any two safety measures
for shopping with debit cards.
d. How can we secure our accounts
even when someone finds our password?
e. Why do you think we should make
online friends only to familiar people?
f. What can we do to keep our
online data safe?
Answer:
a. We
try to protect our physical property by applying several measures like using
locks, alarms, security cameras, security guards, and insurance.
b. To
keep our passwords secret, we should create strong passwords that are unique to
each account, avoid including personal information in them, change them
frequently, and never share them with anyone.
c. Two
safety measures for shopping with debit cards are as follows.
1. Shielding the PIN pad while
making the purchase.
2. Using a chip debit card to
protect financial information.
d.
Even when someone finds our password, we can secure our accounts by adding an
extra layer of security.
e. I
think we should make online friends only with familiar people because relying
on strangers may be risky. There is a risk of misuse of our personal
information. We may be the victims of strangers' wrong intentions.
f. To
keep our online data safe, we can do the following things.
1. Use strong passwords
2. Enable two-factor
authentication
3. Be cautious about sharing
personal information
4. Use antivirus software
5. Avoid public Wi-Fi
6. Back up data regularly
7. Keep software up to date with
the latest security updates.
E.
Have you ever lost your personal data and information while using the internet?
Share your experiences in the class.
Answer:
Yes, I
have lost my personal data and information while using the internet. Actually,
I made mistakes that caused me to lose my personal data and information. My
whole Google Cloud Drive data and information was destroyed. I successfully
uploaded all of my files and information to Google Drive when I first used it.
When I later attempted to retrieve the data I had uploaded, I was unable to
determine the precise position of my data and information storage. I kept
looking there in vain for all of my files. I terminated my Gmail account out of
frustration, which wiped everything in the storage. After a few days, I
received a suggestion from a buddy about how to use Google Drive. Thus, wiping
everything from your drive with just one click is simple. When using the
internet, we must exercise considerably greater caution.
Grammar II
A.
Complete the sentences below with articles a or an.
a. Doctor: What is your problem?
Patient: I have........ fever and
I feel dizzy.
b. Would you like to be ........ actor
in the future?
c. What...... lovely garden you have!
d. We spent half...... hour in
complete silence.
e. Please keep..... eye on our
house while we are away.
f. Mr. Napit has brought ......
ewe in his farm.
g. Ms Sharma's opinion was
criticised as having........one-dimensional perspective.
h. We had to catch ........ early
bus to be here on time.
Answer:
a. a
b. an
c. a
d. an
e. an
f. a
g. a
h. an
B.
Fill in the gaps in the sentences below with a, an or the.
a. Could you open...... window,
please?
b. Did you read........ book I
gave you last week?
d. All the desks were full. So we
had to sit on .floor.
e. Can you play...... flute well?
f. You have........ lovely house.
I am particularly impressed.............. by living room.
g. ……….... president is elected
every five years in Nepal.
h. Do you think that the tourist
is from Japan? No, she looks like.......... European.
i. This............biggest fish I
have ever caught in my life.
j. Bhartmani is known to be......
man of action.
Answer:
a. the
b. the
d. the
e. the
f. a,
the
g. The
h. a
i. the
j. a
C.
Fill in the blanks with the correct articles. If no article is used, put a
cross (X).
a. Mrs. Paudel went to...........
school to meet her son's teacher.
b. What time did you get.........
home yesterday?
c. ……... Netherlands consists of
twelve provinces.
d………… Everest is the pride of our
country.
e. …..... Nile is the longest
river in Africa.
f. …..... New Road is a financial
hub in Kathmandu.
g. ……… Aarohan Gurukul Theater was
founded in 1982.
h. What did you have for.........
breakfast this morning?
i. Braille system was developed to
help..... blind for reading and writing.
j. Do you always play..........
badminton at school?
Answer:
a. the
b. X
c. The
d. X
e. The
f. X
g. The
h. X
i. the
i. X
Writing Il
Write
a newspaper article on "Internet and Cyber Security". Use the
following guidelines in your article.
Introduction to the internet and
technology
Use of the internet in our daily
lives
The abuses of the internet
Need and ways of data privacy
Conclusion
Internet and Cyber Security
Answer:
The Rising
Nepal
April
20
In
today's digital age, the internet has become an integral part of our lives, reforming
the way we communicate, work, shop, and access information. From social media
platforms connecting people worldwide to online banking and e-commerce, the
internet has transformed the way we conduct our daily affairs. However, with
the increasing reliance on technology, the importance of internet and cyber
security has grown exponentially.
The
internet has effortlessly intertwined itself into our daily routines, offering
convenience and efficiency. From staying connected with loved ones through
video calls and social media to conducting virtual meetings and online
learning, the internet has become a lifeline, especially during times of global
crises like the COVID-19 pandemic. Additionally, e-commerce has enabled us to
shop from the comfort of our homes, transforming the retail landscape and
providing access to a wide array of products and services.
While
the internet brings many benefits, it is not without its drawbacks.
Cybercriminals exploit weaknesses in the digital realm, causing significant
harm to individuals, businesses, and even governments. Cyber-attacks such as
data breaches, phishing scams, ransomware, and identity theft have become
increasingly prevalent, resulting in financial losses and compromising personal
information. Furthermore, the spread of misinformation and fake news on social
media platforms has disrupted public discourse and trust in credible sources of
information.
As we
increasingly share sensitive data online, ensuring data privacy has become dominant.
Safeguarding personal information, financial details, and other sensitive data
is crucial to prevent misuse by malicious actors. One way to protect data
privacy is through the use of strong and unique passwords, enabling two-factor
authentication, and keeping software and devices up to date with the latest security
patches. Furthermore, individuals must be cautious about the information they
share on social media and other online platforms, as it can be leveraged by
cybercriminals for malicious purposes.
For previous part CLICK
HERE.
For unit eight CLICK HERE.
For unit six CLICK
HERE.
For Grade 6 CLICK
HERE.
For Grade 7 CLICK
HERE.
For Grade 8 CLICK
HERE.
For Grade 9 CLICK
HERE.
For Grade 10 CLICK
HERE.
For Grade 11 CLICK
HERE.
For Grade 12 CLICK
HERE.
0 Comments