Cyber Safety and Security Class 12 Web Application Code 803 NCERT Book Solution

Book Exercise Solution
I. Multiple Choice Questions
1. What is the term used to describe the data you leave behind online?
a. Online shadow
c. Digital footprint
b. Digital echo
d. Online history
Ans: c. Digital footprint
2. Which of the following is an example of an active component of your digital footprint?
a. Location data collected by your phone (even when not in use)
b. Social media post you write and share
c. Cookies tracking your browsing history on a website
d. Search queries you use on a private browser
Ans: b. Social media post you write and share
3. Which of the following is NOT a potential impact of your digital footprint?
a. Shaping your online reputation
c. Improving your credit score
b. Protecting your privacy
d. Influencing targeted advertising
Ans: b) Protecting your privacy
4. Which of the following is NOT a recommended way to manage your digital footprint?
a. Regularly review and delete old or inappropriate posts.
b. Use privacy-focused tools like browsers and search engines.
c. Share all your personal information publicly on social media.
d. Adjust privacy settings on social media and other platforms.
Ans: c) Share all your personal information publicly on social media
5. Why is it important to be mindful of your digital footprint?
a. It helps you track your online activity for personal insights.
b. It can have long-term consequences in various aspects of your life.
c. It allows companies to offer you more relevant online services.
d. It is essential for maintaining a large network of online connections.
Ans: b) It can have long-term consequences in various aspects of your life
6. What is the primary purpose of data privacy regulations?
a. To restrict the use of the internet
b. To protect personal information from unauthorized access or misuse
c. To control the development of new technologies
d. To censor online content
Ans: b) To protect personal information from unauthorized access or misuse
7. What kind of data is typically protected by data privacy regulations?
a. Publicly available information, such as names and addresses in phone books
b. Personally identifiable information (PII), such as social security numbers and credit card details
c. Non-identifiable data collected through website cookies
d. All of the above
Ans: b. Personally identifiable information (PII), such as social security numbers and credit card details
8. What is the best way to protect your data privacy online?
a. Sharing all your personal information with websites and apps
b. Using strong passwords and keeping them confidential
c. Clicking on all links in emails, even from unknown senders
d. Disabling all privacy settings on your social media accounts
Ans: b) Using strong passwords and keeping them confidential
9. Which of the following is NOT an example of an IPR?
a. Copyright
b. Trademark
c. Patent
d. Trade secret
Ans: d) Trade secret
10. What right does a copyright grant the owner?
a. The exclusive right to use the invention commercially
b. The exclusive right to use a symbol or logo to identify a product or service
c. The exclusive right to control the reproduction and distribution of an original work
d.The exclusive right to prevent unauthorized access to confidential information
Ans: c) The exclusive right to control reproduction and distribution of an original work
11. What is the key difference between a patent and a copyright?
a. Copyrights protect ideas, while patents protect the physical embodiment of an idea.
b. Patents have a longer duration of protection than copyrights.
c. Only tangible objects can be patented, while copyrights can protect intangible works.
d. All of the above
Ans: d) All of the above
12. What is the primary goal of a phishing attack?
a. To spread malware and harm computer systems.
b. To steal personal information such as passwords, credit card details, or login credentials.
c. To disrupt website traffic and cause service outages.
d. To promote a specific product or service.
Ans: b) To steal personal information such as passwords or credit card details
13. _______ theft is when someone uses your personal data to impersonate you, typically to steal from you.
a. Cyberstalking
b. Cyberbullying
c. Identity Theft
d. Email Spoofing
Ans: c) Identity Theft
14. In ______ the email is received from a forged email address but it appears to be from some authentic source.
a. Email Spoofing
b. Email Forging
c. Email harassment
d. Email targeting
Ans: a) Email Spoofing
15. ______ is a type of cybercrime that uses the internet and technology to harass or stalk a person.
a. Cyber Harassing
b. Cyber Targeting
c. Cyber Stalking
d. Cyber Bullying
Ans: c) Cyber Stalking
Cyber Safety and Security
16. You receive an email from a popular video game platform claiming you’ve won a free virtual pet. The email asks you to click on a link and enter your username and password to claim your prize. What should you do?
a. Click on the link and enter your information.
b. Ignore the email and report it to your parents or a trusted adult.
c. Forward the email to your friends to share the good news.
Ans: b) Ignore the email and report it to a trusted adult
17. Your best friend asks you to share your login information for a social media platform because they want to see your private messages. What should you do?
a. Share your username and password with your friend.
b. Explain that sharing passwords is risky and suggest they create their own account.
c. Pretend you forgot your password to avoid sharing it.
Ans: b) Explain that sharing passwords is risky
18. A popular online challenge encourages users to post embarrassing photos of themselves. Your classmates are participating and pressuring you to join. What should you do?
a. Join the challenge to fit in with your classmates.
b. Politely refuse and explain why you don’t feel comfortable participating.
c. Post a fake photo to avoid getting left out.
Ans: b. Politely refuse and explain why you don’t feel comfortable participating.
19. You see someone constantly posting mean comments about another student on social media. What should you do?
a. Join the conversation and add your own negative comments.
b. Report the cyberbullying to a teacher or trusted adult
c. Ignore the situation and hope it goes away on its own.
Ans: b) Report the cyberbullying to a teacher or trusted adult
20. I want to download a new movie, but the website asks you to disable your antivirus software first. What should you do?
a. Disable your antivirus software and download the movie.
b. Close the website and look for the movie from a trusted source.
c. Ask your parents for permission before downloading anything online.
Ans: b) Close the website and look for a trusted source
21. You’re playing your favourite online game when another player asks for your phone number to chat outside the game. What should you do?
a. Give them your phone number right away.
b. Ask your parents if it’s okay to share your phone number.
c. Tell them you don’t want to share your phone number and explain that it’s not safe to give out personal information online.
Ans: c) Refuse to share your phone number
22. You receive an email from a company you like offering a free gift card if you click on a link and enter your name and address. What should you do?
a. Click the link and enter your information right away to get the free gift card.
b. Talk to your parents or a trusted adult about the email before clicking anything.
c. Delete the email because it sounds suspicious and you don’t want to get scammed.
Ans: b) Talk to parents or a trusted adult before clicking
23. You’re creating a new account on a website and it asks for your birthday and address. You’re not sure if it’s safe to share that information. What should you do?
a. Enter your birthday and address without thinking twice.
b. Read the website’s privacy policy to understand how they use your information.
c. Only share information that is absolutely necessary to create the account.
Ans: c) Only share information that is absolutely necessary
24. You’re using a school computer and accidentally leave yourself logged into your social media account. What should you do?
a. Leave it logged in and hope no one else uses it.
b. Tell your teacher and ask them to log you out.
c. Log out of your account before leaving the computer.
Ans: c) Log out of your account before leaving
25. You see a funny meme online about your friend. You think your other friends would find it funny too, so you share it on your social media page. What should you consider before sharing?
a. Share it right away because it’s funny.
b. Think about how your friend might feel if they saw the meme.
c. Ask your friend’s permission before sharing anything about them online.
Ans: c) Ask your friend’s permission before sharing
26. What are some things you can do to create strong passwords?
a. Use the same password for all your online accounts.
b. Use short passwords that are easy to remember.
c. Use a combination of uppercase and lowercase letters, numbers, and symbols.
Ans: c) Use a combination of uppercase, lowercase, numbers and symbols
27. You’re scrolling through social media and see a post from a stranger offering “free” followers for your account. What should you do?
a. Click the link and follow the instructions to get more followers.
b. Report the post as suspicious and tell an adult about it.
c. Ignore the post and never share your login information with anyone.
Ans: b. Report the post as suspicious and tell an adult about it.
28. You’re playing an online game with friends and someone starts sending mean messages in the chat. What should you do?
a. Engage with the person and respond with mean messages back.
b. Report the player to the game moderators and explain the situation.
c. Mute the player and continue playing without engaging in the negativity.
Ans: b. Report the player to the game moderators and explain the situation.
29. You receive a text message from an unknown number claiming to be from your bank and asking you to confirm your account information. What should you do?
a. Reply to the message with your account details to verify your information.
b. Call your bank directly using a phone number you know is correct, not the one provided in the text.
c. Delete the message and avoid clicking on any links it might contain.
Ans: b. Call your bank directly using a phone number you know is correct, not the one provided in the text.
30. You’re creating a new online profile for a school project and need to include pictures. What should you consider before uploading pictures online?
a. Only upload pictures that you’re comfortable with everyone seeing, including future employers and colleges.
b. Avoid uploading pictures that reveal your location or personal information.
c. Ask for permission from anyone else who appears in the photos before uploading them.
Ans: a. Only upload pictures that you’re comfortable with everyone seeing, including future employers and colleges.
31. You’re watching a video online and see an advertisement offering a free download of a popular game. What should you do?
a. Click the download link without hesitation to get the free game.
b. Only download games from trusted sources like official app stores.
c. Read reviews and do research on the game and download the source before proceeding.
Ans: b. Only download games from trusted sources like official app stores.
32. You’re working on a school project and find a website that offers free research papers on your chosen topic. Is it okay to download and use the entire paper for your project?
a. Yes, it’s a great way to save time and get a good grade.
b. No, using someone else’s work without permission is plagiarism and can lead to trouble with your teacher.
c. It’s okay if you cite the website as your source, even if you don’t change anything in the paper.
Ans: b. No, using someone else’s work without permission is plagiarism and can lead to trouble with your teacher.
33. You receive a message from an unknown number claiming to be your bank and asking you to confirm your account information due to suspicious activity. What should you do?
a. Click the link in the message and enter your information as instructed.
b. Delete the message and contact your bank directly through a known phone number or website.
c. Tell your parents or a trusted adult about the message and ask them for help.
Ans: b. Delete the message and contact your bank directly through a known phone number or website.
34. You’re scrolling through your social media feed when you see a friend post a challenge that involves downloading an unknown app to access a hidden filter. What should you do?
a. Download the app right away to try the filter.
b. Talk to your friend about the risks of downloading unknown apps and suggest finding a safer alternative.
c. Report the post to the social media platform for promoting potentially dangerous content.
Ans: b. Talk to your friend about the risks of downloading unknown apps and suggest finding a safer alternative.
35. You’re creating a new online game account and are asked to choose a username. You want to choose a username that’s cool and unique, but it also contains your real name. What should you do?
a. Choose the username that includes your real name because it’s easy to remember.
b. Think of a creative username that doesn’t reveal your real name or personal information.
c. Ask your parents or a trusted adult for suggestions on creating a safe and appropriate username.
Ans: b. Think of a creative username that doesn’t reveal your real name or personal information.
II Answer the following questions
1. Define Cybercrime? Explain at least two types of cybercrimes.
Ans: Cybercrime refers to illegal activities carried out using computers, networks, or the internet to harm individuals, organizations, or systems.
Types of Cybercrime:
1. Phishing:
A fraudulent attempt to obtain sensitive information such as passwords, credit card numbers, or login credentials by pretending to be a trustworthy entity.
2. Cyberbullying:
Using the internet, social media, or digital platforms to harass, threaten, or embarrass someone repeatedly.
2. Differentiate between
a) Cyberbullying and Cyberstalking
b) Malware and Ransomware
c) Trademark and Copyright
d) Phishing and DoS Attacks
Ans: a) Cyberbullying vs Cyberstalking
| Cyberbullying | Cyberstalking |
|---|---|
| Online harassment or humiliation | Continuous monitoring or threatening behaviour |
| Often occurs among students or peers | Often involves obsession and serious threats |
b) Malware vs Ransomware
| Malware | Ransomware |
|---|---|
| Malicious software that damages systems | Malware that locks files and demands payment |
| Includes virus, worms, spyware | Specific type of malware |
c) Trademark vs Copyright
| Trademark | Copyright |
|---|---|
| Protects brand names and logos | Protects creative works |
| Example: company logo | Example: books, music, software |
d) Phishing vs DoS Attack
| Phishing | DoS Attack |
|---|---|
| Steals personal information | Makes a website unavailable |
| Uses fake emails or websites | Overloads a server with traffic |
3. List some security measures that should be followed to be safe from the dreadful act of cyber-crime.
Ans: Security Measures to Prevent Cybercrime
- Use strong and unique passwords
- Enable two-factor authentication
- Avoid clicking suspicious links
- Install antivirus software
- Update software regularly
- Use secure websites (HTTPS)
- Do not share personal information online
- Log out from shared computers
4. Define the term “digital footprint” and differentiate between active and passive digital footprints with an example each.
Ans: Digital Footprint:
The trail of data or information a person leaves behind while using the internet.
Types of Digital Footprint
Active Digital Footprint:
Information you intentionally share online.
Example: Posting on social media.
Passive Digital Footprint:
Information collected without your direct input.
Example: Cookies tracking browsing behaviour.
5. Explain why managing your digital footprint is important. Discuss one positive and one negative impact of digital footprints.
Ans: Importance of Managing Digital Footprint
Managing digital footprint is important because it affects privacy, reputation, and future opportunities.
Positive Impact:
Helps build a professional online reputation.
Negative Impact:
Inappropriate posts may affect job or college opportunities.
6. Describe the importance of responsible online behaviour and how cyber laws contribute to it.
Ans: Responsible online behaviour means using the internet ethically and safely.
Examples:
- Respect others online
- Avoid cyberbullying
- Protect personal information
- Follow copyright laws
Role of Cyber Laws:
Cyber laws help prevent misuse of digital technology and punish cyber criminals.
7. Identify an object or concept in your daily life that would be protected by each of the following:
a) Patent
b) Copyright
c) Trademark.
Ans: a) Patent:
A new technological invention such as a new mobile phone technology.
b) Copyright:
A book, song, movie, or software program.
c) Trademark:
A brand logo or company name like a product brand symbol.
III Answer the following application-based questions
1. You are helping your younger sibling set up their first social media account. They are excited to connect with friends and share their interests online. What advice would you give your sibling about creating a safe and responsible digital footprint from the beginning? Explain your reasoning for each piece of advice.
Ans: Advice for Safe Social Media Use
- Use strong passwords
- Set privacy settings to private
- Avoid sharing personal information
- Think before posting
- Accept friend requests only from known people
2. You receive a message from an unknown number, claiming to be your favorite celebrity and offering you a chance to win a prize. What are some red flags that might indicate this is a scam, and what steps would you take?
Ans: Red Flags:
- Unknown number
- Asking for personal information
- Promising unrealistic prizes
Steps:
- Do not respond
- Block the number
- Report the message
- Inform parents or a trusted adult
3. You’re playing an online game with a friend. They ask you to click on a link to download a cool new skin for your character. What questions would you ask your friend before clicking on the link?
Ans: Questions Before Clicking Game Link
- Is the website trusted or official?
- Where did you get the link from?
- Are other players using it safely?
- Does it require login details?
4. You see a funny meme online that makes fun of a classmate. Even though you don’t agree with the message, some of your friends are pressuring you to share it. How would you handle this situation and why?
Ans: Meme About Classmate
- Do not share the meme
- Explain to friends it may hurt someone
- Promote respectful behaviour online
5. You accidentally post a picture online that you later regret. How would you try to remove the picture and what lessons did you learn from this experience?
Ans: Removing Regretful Photo
Steps:
- Delete the photo immediately
- Request the platform to remove it
- Ask others who shared it to delete it
Lesson:
- Think carefully before posting anything online.
6. You overhear two classmates talking about using someone else’s login information to access a restricted website at school. What are some possible consequences of their actions and what would you do in this situation?
Ans: Using Someone’s Login Information
Possible Consequences
- Violation of school rules
- Disciplinary action
- Privacy breach
Action
- Advise classmates not to do it
- Inform a teacher if necessary.
7. You receive a direct message on social media from someone you don’t know. The message claims you’ve won a contest and asks for your personal information to claim your prize. What are some red flags in this scenario? How can you verify if the contest is legitimate?
Ans: Fake Contest Message
Red Flags
- Unknown sender
- Asking for personal data
- Urgency to claim prize
Verification
- Check official website
- Contact company directly
- Do not share personal information
8. You come across a website that is offering free downloads of the latest video game. The website looks unprofessional and has a lot of pop-up ads. Is it safe to download the game from this website? Why or why not? What are the potential risks involved?
Ans: Free Game Download Website
It is not safe because:
- Untrusted source
- Many pop-up ads
- Possible malware download
Risks
- Virus infection
- Data theft
- System damage
9. You come across a social media post that is promoting a product that seems too good to be true. How can you evaluate the legitimacy of this post and the product it is advertising? What steps would you take to verify its authenticity before sharing it or making a purchase?
Ans: Evaluating Suspicious Product Post
Steps:
- Check reviews and ratings
- Verify the seller
- Look for official website
- Avoid offers that are too good to be true
10. You receive an email from a company claiming to be your bank, asking you to verify your account information by clicking on a link. What red flags should you look for to identify if this might be a phishing scam attempting to steal your data? How can you safely verify your bank account information if
needed?
Ans: Phishing Email from Bank
Red Flags
- Urgent request for account details
- Suspicious link
- Unknown sender email
Safe Action
- Contact bank directly using official contact details
- Do not click the link
