New Posts

6/recent/ticker-posts

Unit 7: Cyber Security (Class 10) Part II

 Unit 7: Cyber Security

Reading II

Cyber Security: Basic Internet Safety Tips (Page 110)

A. Match the words given below with their meanings.

a. possession i. to prevent something bad from happening

b. intertwined ii. quick to detect or respond to slight changes or signals

c. integration iii. an act of buying or selling; deal

d. avoid          iv. protecting something from danger or harm

e. sensitive    v. something that you own or have with you; belongingness

f. proliferated vi. the act of proving that something is real or true

g. shielding    vii. the act of combining two or more things together

h. promptly    viii. closely connected with somebody or something

i. authentication ix. increased rapidly in number or amount

j. transaction x. without any delay

 

Answer:

a. possession             v. something that you own or have with you; belongingness

b. intertwined            viii. closely connected with somebody or something

c. integration             vii. the act of combining two or more things together

d. avoid                      i. to prevent something bad from happening

e. sensitive                 ii. quick to detect or respond to slight changes or signals

f. proliferated            ix. increased rapidly in number or amount

g. shielding                iv. protecting something from danger or harm

h. promptly                x. without any delay

i. authentication        vi. the act of proving that something is real or true

j. transaction             iii. an act of buying or selling; deal

B. State whether the following statements are true or false.

a. It is a good idea to use the same password in different accounts for safety purpose.

b. The teenagers are more vulnerable than any other age groups regarding the internet safety.

c. It is not safe to let the computer remember our passwords.

d. A cheap debit card is safer than the expensive one.

e. It is not safe to enable auto update of software in our devices.

f. We should never enter our financial details on websites.

Answer:

a. It is a good idea to use the same password in different accounts for safety purpose. False

b. The teenagers are more vulnerable than any other age groups regarding the internet safety. False

c. It is not safe to let the computer remember our passwords. True

d. A cheap debit card is safer than the expensive one. False

e. It is not safe to enable auto update of software in our devices. False

f. We should never enter our financial details on websites. True

 

C. Read the following paragraph headings and write the correct paragraph name (A-H) against them.

a. Keep your Personal Data Safe

b. Keep Personal Information Private

c. Set up Two-factor Authentication

d. Make Sure your Devices are Secure

e. Be Careful about WiFi

f. Pay Attention to Software Updates

g. Back up your Personal Data

h. Protect your Personal Information with Strong Passwords

Answer:

A h. Protect your Personal Information with Strong Passwords

B a. Keep your Personal Data Safe

C c. Set up Two-factor Authentication

D f. Pay Attention to Software Updates

E e. Be Careful about WiFi

F c. Set up Two-factor Authentication

G b. Keep Personal Information Private

H g. Back up your Personal Data

D. Answer these questions.

a. How do we try to protect our physical property?

b. What should we do to keep our passwords secret?

c. Mention any two safety measures for shopping with debit cards.

d. How can we secure our accounts even when someone finds our password?

e. Why do you think we should make online friends only to familiar people?

f. What can we do to keep our online data safe?

Answer:

a. We try to protect our physical property by applying several measures like using locks, alarms, security cameras, security guards, and insurance.

b. To keep our passwords secret, we should create strong passwords that are unique to each account, avoid including personal information in them, change them frequently, and never share them with anyone.

c. Two safety measures for shopping with debit cards are as follows.

1. Shielding the PIN pad while making the purchase.

2. Using a chip debit card to protect financial information.

d. Even when someone finds our password, we can secure our accounts by adding an extra layer of security.

e. I think we should make online friends only with familiar people because relying on strangers may be risky. There is a risk of misuse of our personal information. We may be the victims of strangers' wrong intentions.

f. To keep our online data safe, we can do the following things.

1. Use strong passwords

2. Enable two-factor authentication

3. Be cautious about sharing personal information

4. Use antivirus software

5. Avoid public Wi-Fi

6. Back up data regularly

7. Keep software up to date with the latest security updates.

 

E. Have you ever lost your personal data and information while using the internet? Share your experiences in the class.

Answer:

Yes, I have lost my personal data and information while using the internet. Actually, I made mistakes that caused me to lose my personal data and information. My whole Google Cloud Drive data and information was destroyed. I successfully uploaded all of my files and information to Google Drive when I first used it. When I later attempted to retrieve the data I had uploaded, I was unable to determine the precise position of my data and information storage. I kept looking there in vain for all of my files. I terminated my Gmail account out of frustration, which wiped everything in the storage. After a few days, I received a suggestion from a buddy about how to use Google Drive. Thus, wiping everything from your drive with just one click is simple. When using the internet, we must exercise considerably greater caution.

Grammar II

A. Complete the sentences below with articles a or an.

a. Doctor: What is your problem?

Patient: I have........ fever and I feel dizzy.

b. Would you like to be ........ actor in the future?

c. What...... lovely garden you have!

d. We spent half...... hour in complete silence.

e. Please keep..... eye on our house while we are away.

f. Mr. Napit has brought ...... ewe in his farm.

g. Ms Sharma's opinion was criticised as having........one-dimensional perspective.

h. We had to catch ........ early bus to be here on time.

Answer:

a. a

b. an

c. a

d. an

e. an

f. a

g. a

h. an

B. Fill in the gaps in the sentences below with a, an or the.

a. Could you open...... window, please?

b. Did you read........ book I gave you last week?

d. All the desks were full. So we had to sit on .floor.

e. Can you play...... flute well?

f. You have........ lovely house. I am particularly impressed.............. by living room.

g. ……….... president is elected every five years in Nepal.

h. Do you think that the tourist is from Japan? No, she looks like.......... European.

i. This............biggest fish I have ever caught in my life.

j. Bhartmani is known to be...... man of action.

Answer:

a. the

b. the

d. the

e. the

f. a, the

g. The

h. a

i. the

j. a

C. Fill in the blanks with the correct articles. If no article is used, put a cross (X).

a. Mrs. Paudel went to........... school to meet her son's teacher.

b. What time did you get......... home yesterday?

c. ……... Netherlands consists of twelve provinces.

d………… Everest is the pride of our country.

e. …..... Nile is the longest river in Africa.

f. …..... New Road is a financial hub in Kathmandu.

g. ……… Aarohan Gurukul Theater was founded in 1982.

h. What did you have for......... breakfast this morning?

i. Braille system was developed to help..... blind for reading and writing.

j. Do you always play.......... badminton at school?

Answer:

a. the

b. X

c. The

d. X

e. The

f. X

g. The

h. X

i. the

i. X

 

Writing Il

Write a newspaper article on "Internet and Cyber Security". Use the following guidelines in your article.

Introduction to the internet and technology

Use of the internet in our daily lives

The abuses of the internet

Need and ways of data privacy

Conclusion

Internet and Cyber Security

Answer:

The Rising Nepal

April 20

In today's digital age, the internet has become an integral part of our lives, reforming the way we communicate, work, shop, and access information. From social media platforms connecting people worldwide to online banking and e-commerce, the internet has transformed the way we conduct our daily affairs. However, with the increasing reliance on technology, the importance of internet and cyber security has grown exponentially.

 

The internet has effortlessly intertwined itself into our daily routines, offering convenience and efficiency. From staying connected with loved ones through video calls and social media to conducting virtual meetings and online learning, the internet has become a lifeline, especially during times of global crises like the COVID-19 pandemic. Additionally, e-commerce has enabled us to shop from the comfort of our homes, transforming the retail landscape and providing access to a wide array of products and services.

 

While the internet brings many benefits, it is not without its drawbacks. Cybercriminals exploit weaknesses in the digital realm, causing significant harm to individuals, businesses, and even governments. Cyber-attacks such as data breaches, phishing scams, ransomware, and identity theft have become increasingly prevalent, resulting in financial losses and compromising personal information. Furthermore, the spread of misinformation and fake news on social media platforms has disrupted public discourse and trust in credible sources of information.

 

As we increasingly share sensitive data online, ensuring data privacy has become dominant. Safeguarding personal information, financial details, and other sensitive data is crucial to prevent misuse by malicious actors. One way to protect data privacy is through the use of strong and unique passwords, enabling two-factor authentication, and keeping software and devices up to date with the latest security patches. Furthermore, individuals must be cautious about the information they share on social media and other online platforms, as it can be leveraged by cybercriminals for malicious purposes.

 

 

For previous part CLICK HERE.

For unit eight CLICK HERE.

For unit six CLICK HERE.

For Grade 6 CLICK HERE.

For Grade 7 CLICK HERE.                                                            

For Grade 8 CLICK HERE.

For Grade 9 CLICK HERE.

For Grade 10 CLICK HERE.

For Grade 11 CLICK HERE.

For Grade 12 CLICK HERE.

 


Post a Comment

0 Comments