Cyber Safety
Solutions for Computer Science, Class 11, CBSE
Assertions And Reasons
7 questionsAssertion (A): Viruses are malicious programs.
Reasoning (R): Malicious programs are specifically designed to delete, block, modify or copy data in order to disrupt the performance of computers.
- Both A and R are true and R is the correct explanation of A.
- Both A and R are true but R is not the correct explanation of A.
- A is true but R is false.
- A is false but R is true.
Answer:
Both A and R are true and R is the correct explanation of A.
Explanation
Viruses are malicious programs designed to harm computer systems. A malicious program is a file or code, typically delivered over a network, that infects, explores, steals or conducts virtually any behavior an attacker wants.
Assertion (A): An internet troll is a person who deliberately sows discord on the internet by starting quarrels or upsetting people.
Reasoning (R): We can download and use any material available on the internet.
- Both A and R are true and R is the correct explanation of A.
- Both A and R are true but R is not the correct explanation of A.
- A is true but R is false.
- A is false but R is true.
Answer:
A is true but R is false.
Explanation
A cyber troll is a person who starts quarrels or upsets people on the internet by posing inflammatory, digressive, extraneous or off-topic messages to an online community with the intent of provoking readers into displaying emotional responses and normalizing tangential discussion, either for the troll's amusement or for a specific gain. We cannot download and use any material available on the internet, due to copyright issues and legal restrictions.
Assertion (A): Social media are websites or applications that enable users to participate in social networking but they cannot create and share content with others in the community.
Reasoning (R): We should not waste precious time in responding to unnecessary emails or comments unless they have some relevance for us.
- Both A and R are true and R is the correct explanation of A.
- Both A and R are true but R is not the correct explanation of A.
- A is true but R is false.
- A is false but R is true.
Answer:
A is false but R is true.
Explanation
Social media refers to web and mobile technologies and practices that enable users to participate in social networking and share content, opinions, experiences, and perspectives online. We should avoid wasting precious time responding to unnecessary emails or comments unless they are relevant to us.
Assertion (A): Cyberstalkers collect all personal information of the victim.
Reasoning (R): Cyberstalkers post the email of the victim on numerous filthy, obscene or illegal websites.
- Both A and R are true and R is the correct explanation of A.
- Both A and R are true but R is not the correct explanation of A.
- A is true but R is false.
- A is false but R is true.
Answer:
Both A and R are true and R is the correct explanation of A.
Explanation
Cyberstalking is the use of the internet or other electronic means to stalk or harass an individual, a group of individuals, or an organization. Cyberstalkers gather personal information about their victims and post their email addresses on numerous filthy, obscene, or illegal websites to harass them.
Assertion (A): Harassing a person using modern technologies like the internet is called cyber bullying.
Reasoning (R): Cyberbullying is not a cybercrime.
- Both A and R are true and R is the correct explanation of A.
- Both A and R are true but R is not the correct explanation of A.
- A is true but R is false.
- A is false but R is true.
Answer:
A is true but R is false.
Explanation
Cyberbullying is an attack on an individual or a group through the use of electronic means such as instant messaging, social media, email, and other forms of online communication with the intent to abuse, intimidate, or overpower. Cyberbullying is considered a cybercrime.
Assertion (A): IT Act 2000 provides legal recognition to electronic commerce.
Reasoning (R): IT (Amendment) Act 2008 provides additional focus on information security.
- Both A and R are true and R is the correct explanation of A.
- Both A and R are true but R is not the correct explanation of A.
- A is true but R is false.
- A is false but R is true.
Answer:
Both A and R are true and R is the correct explanation of A.
Explanation
The Information Technology Act, 2000 is the primary law in India dealing with cybercrime and electronic commerce. A major amendment was made to the IT Act in 2008. It introduced section 69, which gave authorities the power of "interception or monitoring or decryption of any information through any computer resource".
Assertion (A): Cyber law is a generic term which refers to all the legal and regulatory aspects of the internet and the World Wide Web.
Reasoning (R): Cyber law covers all aspects of transactions and activities on and concerning the internet, the World Wide Web and Cyberspace.
- Both A and R are true and R is the correct explanation of A.
- Both A and R are true but R is not the correct explanation of A.
- A is true but R is false.
- A is false but R is true.
Answer:
Both A and R are true and R is the correct explanation of A.
Explanation
Cyber law is a broad term that encompasses all legal and regulatory aspects related to the internet and the World Wide Web. It includes various rules and regulations governing online activities, transactions, and interactions.
Fill In The Blanks
14 questionsMultiple Choice Questions
15 questionsAnswer:
Identity theft
Reason — Identity theft is a type of fraud that involves using someone else's identity to steal money or gain other benefits.
Answer:
Cookies
Reason — Cookies are small text files, bits of information, left on our computer by websites we have visited which let them 'remember' things about us.
Answer:
Confidentiality
Reason — Confidentiality of information ensures that only authorized users get access to sensitive and protected data.
Answer:
Cybercrime
Reason — Any criminal act that is facilitated by the use of electronic gadgets such as computer, smartphones, laptop etc, involving communications or information systems through internet, is referred to as cybercrime.
Answer:
Ignorance
Reason — Ignorance refers to a lack of knowledge or awareness and does not pose an external threat to a computer or network. External threats, such as Trojan horses, adware, and crackers, involve malicious actions that harm a system.
Answer:
Stalking
Reason — Stalking involves repeatedly harassing or threatening behaviour, such as following, calling, or sending unwanted messages to a person.
Answer:
Information Technology (IT) Act, 2000
Reason — The name of the IT law in the Indian legislature is the Information Technology Act, 2000 (IT Act 2000).
Answer:
Cyber troller
Reason — A cyber troll is a person who starts quarrels or upsets people on the internet by posing inflammatory, digressive, extraneous or off-topic messages to an online community with the intent of provoking readers into displaying emotional responses and normalizing tangential discussion, either for the troll's amusement or for a specific gain.
Answer:
Digital footprints
Reason — Digital Footprints are the records and traces of individual's activities as they use the Internet.
Answer:
Both (1) and (2)
Reason — Cybercrime involves using a computer both as a tool to commit illegal activities, such as hacking or fraud, and as a target, where the computer or network itself is attacked, for example, through viruses or denial-of-service attacks.
Solutions To Unsolved Questions
41 questionsAnswer:
Yes, we should use an incognito window while surfing the internet. It helps protect the confidentiality of information by not saving cookies and browsing history, which reduces the risk of identity theft and keeps our personal data safe.
Answer:
(a) True
Reason — When we share our IP address on the network with other devices, a website can determine our geographical location.
(b) True
Reason — Cookies are small text files on our computer storing small pieces of information related to our online habits/text.
(c) False
Reason — Using strong internet passwords is essential for maintaining cyber safety as they help protect accounts from unauthorized access.
Answer:
We can safely browse the internet by following the tips given below:
(a) Before we start browsing the web, make sure to protect ourself by keeping our operating system, web browser, security software, browser plug-ins, and other applications up-to-date.
(b) We can adjust settings in our web browser to work in a more or less secure way. Most web browsers will give us warnings when they detect that we are visiting a malicious website or possibly being exposed to malicious content.
(c) We should use strong, unique passwords online, download files and applications only from trusted websites, and pause to think before clicking on links in emails, messages, or on social networking sites.
(d) While making purchases online check if the site is reputed and has a refund policy.
(e) We should regularly clear cookies from our computer, as they collect information about our activity on websites.
(f) If there are sites we visit regularly, it is a good idea to bookmark them in our browser.
Answer:
We can safely browse the internet by following the tips given below:
(a) Before we start browsing the web, make sure to protect ourself by keeping our operating system, web browser, security software, browser plug-ins, and other applications up-to-date.
(b) We can adjust settings in our web browser to work in a more or less secure way. Most web browsers will give us warnings when they detect that we are visiting a malicious website or possibly being exposed to malicious content.
(c) We should use strong, unique passwords online, download files and applications only from trusted websites, and pause to think before clicking on links in emails, messages, or on social networking sites.
(d) While making purchases online check if the site is reputed and has a refund policy.
(e) We should regularly clear cookies from our computer, as they collect information about our activity on websites.
(f) If there are sites we visit regularly, it is a good idea to bookmark then in our browser.
Answer:
The tips for cyber safety are as follows:
(a) Before we start browsing the web, make sure to protect ourself by keeping our operating system, web browser, security software, browser plug-ins, and other applications up-to-date.
(b) We can adjust settings in our web browser to work in a more or less secure way. Most web browsers will give us warnings when they detect that we are visiting a malicious website or possibly being exposed to malicious content.
(c) We should use strong, unique passwords online, download files and applications only from trusted websites, and pause to think before clicking on links in emails, messages, or on social networking sites.
(d) While making purchases online check if the site is reputed and has a refund policy.
(e) We should regularly clear cookies from our computer, as they collect information about our activity on websites.
(f) If there are sites we visit regularly, it is a good idea to bookmark them in our browser.
Answer:
If cyber safety is overlooked, several dangers can arise, including:
- Data theft, where personal and financial information is stolen.
- Malware infections that can damage or encrypt data.
- Phishing attacks that trick users into revealing sensitive information.
- Loss of privacy due to unauthorized access to personal data.
- Financial loss from fraudulent transactions.
- Damage to reputation from leaked or misused information.
- Legal consequences from non-compliance with data protection regulations.
Answer:
The different types of information used by websites to track us online are as follows:
- IP Address — When we share our IP address on the network with other devices, a website can determine our geographical location.
- Cookies and Tracking Scripts — They can identify and track our browsing activity across a website.
- HTTP Referrer — When a link to an outside website on a webpage is clicked, then the linked website will get opened and internally our information will be provided to the linked website.
- Super Cookies — Super Cookies are persistent cookies that come back even after we delete them. They store cookie data at multiple places, for example, in Flash cookies, Silverlight storage, our browsing history and HTML5 local storage etc.
- User Agent — It tells websites our browser and operating system, providing another piece of data that can be stored and used to target ads.
Answer:
(a) Robin is experiencing targeted ads due to adware, which collects information about his online activities. Since he searched for wrist watches and sports items, the adware uses this data to display related advertisements.
(b) To avoid this, Robin should use ad blockers, browse in private mode, and be cautious about installing software from untrusted sources.
(c) To get rid of the adware, he should run anti-adware scans using reputable tools, uninstall any suspicious programs, reset his browser settings, and ensure his security software is up-to-date. These steps will help remove the adware and prevent further unwanted advertisements.
Answer:
Gender discrimination refers to the unfair or unequal treatment of individuals based on their gender.
In the classroom, gender discrimination can significantly hamper the teaching and learning process in several ways:
- Unequal Opportunities — Students may not receive the same opportunities to participate in activities, discussions, or leadership roles based on their gender, limiting their engagement and development.
- Bias in Assessment — Teachers might unconsciously favour one gender over another, leading to biased assessments and unfair evaluations of students' abilities and contributions.
- Stereotyping — Gender stereotypes can influence the expectations teachers and peers have of students, affecting their confidence and interest in subjects traditionally associated with their gender, such as STEM fields for girls or arts for boys.
- Reduced Participation — Students may feel discouraged from participating or expressing themselves freely if they believe their gender will lead to judgment or discrimination, which can impact their learning experience and academic performance.
- Limited Role Models — Gender discrimination can result in a lack of diverse role models in teaching materials or staff, making it harder for students to envision themselves in various careers or roles beyond traditional gender expectations.
Answer:
Viruses are programs that copy themselves throughout a computer or network. Viruses can only be activated when a user opens the program. At their worst, viruses can corrupt or delete data, use the user's email to spread, or erase everything on the hard disk. If not checked, a virus can damage the system or specific files which are important for the functioning of an operating system. It may also slow down our computer as a result of replication of virus in the background without being visible on the screen.
Answer:
Malware that collects information about the usage of the infected computer and communicates it back to the attacker is known as Spyware.
Adware refers to a type of malware that displays unwanted advertisements on our computer or device.
Answer:
Spyware | Adware |
---|---|
Malware that collects information about the usage of the infected computer and communicates it back to the attacker is known as Spyware. | Adware refers to a type of malware that displays unwanted advertisements on our computer or device. |
It finds its way into PCs by "piggybacking" onto a file, or gets downloaded from the internet when we visit a particular website. | Adware is commonly activated unknowingly when users are trying to install legitimate applications that adware is bundled with. |
Answer:
Worm | Trojan horse |
---|---|
Worms are self-replicating viruses that exploit security vulnerabilities to automatically spread themselves across computers and networks. | Malware disguised in what appears to be legitimate software are known as Trojan horse. |
It can replicate itself and spread automatically. | Trojans do not replicate or reproduce through infection, instead, it performs whatever actions it has been programmed to carry out. |
Answer:
Malware (Malicious Software) is a file or code, typically delivered over a network, that infects, explores, steals or conducts virtually any behavior an attacker wants. It includes various forms of malicious software, such as viruses, spyware, trojans and worms.
Worms are a type of malware that are self-replicating viruses that exploit security vulnerabilities to automatically spread themselves across computers and networks.
Answer:
We need a secure connection while doing net banking to protect sensitive financial information and prevent unauthorized access. Secure connections, indicated by "HTTPS" in the URL and a padlock icon in the browser, encrypt data transmitted between the user’s device and the bank’s server.
Answer:
Yes, WhatsApp is considered secure due to its use of end-to-end encryption, which ensures that messages, calls, photos, and videos are encrypted and can only be read by the intended recipient, using special keys to decrypt the content.
Answer:
The URL of a secure website begins with "https" rather than "http". Also, the Internet browsers display a padlock icon in address bar to indicate that the website is secure. These checks help ensure that the website is opened in secure mode.
Answer:
HTTP | HTTPS |
---|---|
The full form of HTTP is Hypertext Transfer Protocol. | The full form of HTTPS is Hypertext Transfer Protocol Secure. |
HTTP is the set of rules for transferring hypertext on world wide web (WWW). | HTTPS is a secure version of the HTTP protocol that uses the SSL/TLS protocol for encryption and authentication. |
HTTP sends data in plain text. | HTTPS sends the data in encrypted form to make the transmission secure. |
URLs using HTTP start with "http://". | URLs using HTTPS start with "https://". |
Answer:
Two websites which use https are:
- Google (https://www.google.com)
- Amazon (https://www.amazon.com)
Answer:
Confidentiality of information can be maintained by observing the following practices:
- Prevention by encrypting the data and by limiting the places where it might appear.
- Using firewall wherever possible.
- Controlling browser settings to block tracking.
- Browsing privately wherever possible.
- Taking care while posting on social media.
- Ensuring safe sites while entering crucial information.
- Ensuring that the address contains HTTPS and a padlock sign.
- Carefully handling emails.
- Not giving sensitive information on wireless networks.
- Avoiding use of public computers.
Answer:
In India, cyber laws are enforced through the Information Technology Act, 2000, which was notified on October 17, 2000. It is the primary legislation in India dealing with cybercrime and electronic commerce. The IT Act is a key legal framework that provides support to computer users against cybercrime.
Answer:
Cybercrime impacts our daily lives by causing financial losses, invading our privacy, and disrupting online services. It can lead to stress and damage to personal and professional reputations. Overall, it undermines trust in digital systems and creates extra costs for dealing with the aftermath.
Answer:
Two effective methods for preventing and protecting against cybercrime are:
Observe safe online behavior:
- Use strong unique passwords online.
- Download files and applications only from those websites that we trust, such as from official app stores or legitimate organizations, such as our bank.
- Pause and think before clicking on links in email, messages or on social networking sites. Don't click on links in messages if we don't know the sender or if the message is unexpected.
- If a link looks suspicious or we can't tell where it leads to, before clicking, hover over that link to see the actual web address it will take us to. If we do not recognize or trust the address, try searching for relevant key terms in a web browser. This way we can find the article, video or webpage without directly clicking on the suspicious link.
- Beware of offers that seem too good to be true. Leave websites that ask for our personal or banking details in return for money, these are scams.
Online transaction handling: While making purchases online,
- Check if the site is reputed and has a refund policy.
- While making payments, check that we are using a secure connection. The URL of a secure payment page will use 'https' instead of 'http' and a padlock icon will be displayed by our browser.
- If the website looks suspicious or there are doubts, do not proceed.
- Don't use online banking or make payments with credit cards using public computers or Wi-Fi.
Answer:
The steps to be taken to protect oneself from online fraud are as follows:
- Before we start browsing the web, we must ensure that our operating system, web browser, security software, browser plug-ins, and other applications are up-to-date.
- We must adjust our web browser’s settings for better security. Most browsers will warn us if we are visiting a risky website.
- We should use strong, unique passwords online, only download from trusted sites, and always think twice before clicking on links in emails, messages, or social media.
- When shopping online, we should check if the website is trusted and has a refund policy.
- We should clear cookies regularly as they track our online activity.
- We should bookmark trusted websites that we visit often to prevent mistyping the website name.
Answer:
Four steps to combat cybercrime are as follows:
- Before we start browsing the web, we must ensure that our operating system, web browser, security software, browser plug-ins, and other applications are up-to-date.
- We should use strong, unique passwords online, only download from trusted sites, and always think twice before clicking on links in emails, messages, or social media.
- When shopping online, we should check if the website is trusted and has a refund policy.
- We should clear cookies regularly as they track our online activity.
Answer:
Social networking sites play a role in cybercrime in several ways. Since many people use them, some believe they can post anything without facing consequences by using fake email IDs or hiding their identity. This allows them to share false information, spread rumours, or make harmful comments, leading to arguments, harassment, and even causing communal tension. This kind of behaviour not only disturbs social harmony but also encourages cybercrimes like fraud and identity theft.
State True Or False
13 questionsAnswer:
True
Reason — Digital Footprints are the records and traces of individual's activities as they use the Internet. Digital Footprints are permanently stored and can include data such as social media posts, online searches, and interactions with websites.
Answer:
True
Reason — A cyber troll is a person who starts quarrels or upsets people on the internet by posting inflammatory, digressive, extraneous or off-topic messages to an online community with the intent of provoking readers into displaying emotional responses and normalizing tangential discussion, either for the troll's amusement or for a specific gain.
Answer:
True
Reason — To avoid tracking by website, we should browse internet privately. This is because websites can collect and track our online data, including browsing history, search queries, and personal information, through various means such as cookies etc.
Answer:
False
Reason — Cyberbullying is an attack on an individual or group through the use of electronic means such as instant messaging, social media, email, and other forms of online communication, with the intent to abuse, intimidate, or overpower. A barrage of online messages and emails, on the other hand, refers to spamming.