Page 1 :
VIDEN, CRIME, , EXERCISE, , A. Tick (“) the correct answer., , 1. is referred to code of behaviour to be followed when online., a) Cyber Laws b) Cyber Crime efCyber Ethics, Quick Heal, McAfee and AVG are examples of ‘, a) Firewall Ve Antivirus ¢) Encryption Software, , is a meaningless data., a) Plain text Af Cipher text c) Decode, 4A is a security system between a computer and the Internet., vorfirewall b) Antivirus c) Encryption Software, 5, GNU is an example of ;, af Encryption software —b) Malware c) Virus, , Fill in the blanks., , An antivirus is a computer program that removes computer viruses., , Cybercrime is any crime that involves a computer and a network., , A process of converting cipher text to plain text is known as Decryption., , A set of moral rules to be followed being online is known as Cyber Ethics., , Identity Theft refers to the act of stealing and misusing someone's personal information., , Write True (T) or False (F)., McAfee is a firewall., , Encryption software sits between a computer and the Internet to provide security. (_, You should share your password with your friends., , Cyber bullying is a type of Cyber Crime against an individual., , An antivirus scans specific files for any malware., , Short answer type questions., What do you mean by Cybercrime?, , Cybercrime is defined as a crime in which a computer is the object of the crime or is used, , as a tool to commit a crime. It is any crime that involves a computer and a network., What is an antivirus software?, , An antivirus is a computer program that is designed to identify, prevent, detect and, remove computer viruses and other malicious software., , What do you understand by Cyber Safety?, , Cyber Safety is a fundamental practice, required for everyone to prevent the loss or, misuse of their information. It is required to keep the personal, financial information and, online data safe., , Long answer type questions., , What is difference between Cyber Ethics and Cyber Law?, , Cyber Ethics Cyber Laws, , i) It is a guideline to the computer users. i) It is a rule or law to control computer users., , ii) It is universal can be applied ii) It depends on country and state where the, anywhere, all over the world. crime is being committed., , iii) It is immoral if Cyber Ethics are ili) tis a crime if Cyber Laws are not followed., not followed., , What is difference between Encryption and Decryption?, , Encryption is the process of changing information in such a way as to make it unreadable, by unauthorised user., , Decryption is the process of converting cipher text back to plain text., Write any three points to protect yourself against the Identify Theft., , 1) Secure your connection: If you are going to use your personal information online,, make sure you do so only when your connection is secure. If possible, avoid public Wi-Fi, with no password protection., , 2) Keep your devices secure: Protect your laptop, smartphone and tablet from malicious, software and attackers by using a reliable, up-to-date security solution., , 3) Maintain good password hygiene: Create strong passwords that are long, hard to, guess and unique., , Application based questions., , Harshit wants to write a message for his friend. He wants only his friend to read it not, an unauthorised user. Which method will he use to perform this task?, , He should use encrypted message., , Aakriti was trying to log in to her E-mail account but could not do so. There was an, error of incorrect user name or password. What could be the reason for this? What, precautions she should have taken to protect her login details?, , Someone might have hacked her password., , 1) She should remember to log out her account., 2) She should create a strong password., , 3) She should change her password regularly.