Chapter 10: Digital Footprint and Cyber Safety
Exercises (Pgs. 151-154)
A. Tick (✓) the correct answers.
1. b
2. a
3. a
4. a
5. b
B. Fill in the blanks.
1. passive
2. cyber
3. harassing
4. impersonation
5. Cybercrime
C. Write T for True and F for False.
1. T
2. T
3. F
4. F
5. F
D. Answer the following questions.
Q.1 What is a digital footprint? What are the different types of activities that contribute to it?
Ans:- A digital footprint is a trail of data you create through your activities on the Internet. This includes everything from the websites you visit and the comments you leave on the online shopping you do.
You create digital footprints through various actions, including:
1. Clicking
2. Posting
3. Submitting information
4. Viewing
Q.2 What are the two types of digital footprint ? how do they differ from each other?
Ans:- There are two types of digital footprints: Active and Passive.
Active Digital Footprint:- Active Digital Footprints refer to the information you intentionally share online for others to see. This includes actions such as sending an email, uploading a photo, or posting a comment on social media. On the other hand.
Passive Digital Footprint :-A passive digital footprint is formed without direct input—like when search history triggers related ads. It records behind-the-scenes online activity, reflecting your interests through automated data collection.
Q.3 How can social media influence your digital footprint?
Ans:- Social media plays a key role in shaping your digital footprint. Everything you share online, whether it’s a photo, a post, or a comment, gets stored somewhere in the cloud permanently. Even if you decide to delete a post later, it may still exist on the Internet in some form and can’t be completely erased from everywhere.
Q.4 Write any three forms of cybercrime?
Ans:- Three common forms of cybercrime include:
• Hacking: Unauthorized access to computer systems or networks. Hackers can steal sensitive data, disrupt services, or cause financial damage.
• Phishing: Fraudulent attempts to obtain sensitive information by pretending to be a trustworthy entity. This can lead to identity theft or monetary loss.
• Online fraud: This includes scams like fake e-commerce sites or identity theft, often leading to financial losses for individuals and businesses.
Q.5 Explain about cyberbullying .
Ans:- Cyberbullying is online abuse through trolling, hacking, or impersonation that harms a person’s emotions, reputation, and trust. It includes spreading false information or sharing private details without consent. Recognizing these signs helps victims seek timely support and protection.
Activity Hub (Pg. 154)
Tick (✓) the responsible behaviour.
1. c
2. b
No comments:
Write CommentsPlease ask any question about gk related