Study Materials Available

Access summaries, videos, slides, infographics, mind maps and more

View Materials
Quick Review Flashcards - Click to flip and test your knowledge!
Question
What is the definition of a 'digital footprint'?
Answer
Information about a person existing on the Internet due to their online activity, even after its deletion.
Question
Why should users be cautious of emails from unknown sources claiming they are 'lucky winners'?
Answer
These are often spam mails sent with malicious intent to cause trouble.
Question
What is 'Phishing'?
Answer
An attempt to obtain sensitive information like passwords or credit card details by posing as a trustworthy source.
Question
What is the primary purpose of 'Malware'?
Answer
To act as malicious software that can be installed on a device to cause harm.
Question
Which specific indicator in an email address like 'game_download@fiffa.com' suggests it is fake?
Answer
The incorrect spelling of a well-known brand (e.g., 'fiffa' instead of 'fifa').
Question
How does a 'limited time offer' (e.g. valid for only 48 hours) function in a spam email?
Answer
It pressures the recipient into making a hasty, poorly considered decision.
Question
Why is it important to check the URL of a website reached via an email link?
Answer
To verify if the website is secure and genuine rather than a phishing site.
Question
What is the recommended action regarding personal information in emails from unknown senders?
Answer
Do not provide details such as name, date of birth, address, or school name.
Question
Under what circumstances should a user click on links or download attachments from an email?
Answer
Only when the email is from a trusted source and the website is known to be secure.
Question
Why should users avoid forwarding spam or suspicious emails to others?
Answer
To prevent spreading malicious content or distracting other receivers with excessive forwards.
Question
What is 'Identity Theft'?
Answer
The deliberate use of someone else’s identity to obtain credit, benefits, or to defame them.
Question
How long does a digital footprint typically stay online?
Answer
It remains online forever.
Question
What risk is associated with revealing too much personal information on social networking sites?
Answer
It can lead to identity theft.
Question
With whom should a user communicate and collaborate on social networking sites?
Answer
Only with people known to them offline.
Question
What is the rule regarding sharing passwords on social media?
Answer
Never reveal a password to anyone except a parent or guardian.
Question
How frequently should passwords for online accounts be changed?
Answer
Passwords should be changed frequently.
Question
What precaution should be taken before posting group photos or a friend's location?
Answer
Protect their privacy by not posting details that might put them at risk.
Question
What should you do if you suspect your social networking account has been compromised?
Answer
Report it immediately to the support team of the networking site.
Question
What is the protocol for leaving an online account when not in use?
Answer
Log out immediately and never leave the account unattended after login.
Question
What does 'Cyber Bullying' include?
Answer
Sending, posting, or sharing negative, harmful, false, or mean information about someone.
Question
How should a victim respond to a cyber bully online?
Answer
Do not respond or retaliate, as it may make matters worse.
Question
Why is it important to take screenshots of cyber bullying instances?
Answer
To keep a record of the harassment for reporting purposes.
Question
What feature do most online platforms provide to deal with offenders?
Answer
The 'Block and Report' feature.
Question
Whom should a student inform if they are experiencing cyber bullying?
Answer
Their parents and teachers.
Question
What is the legal status of cyber bullying?
Answer
It is a serious offence punishable under Cyber Law.
Question
List three common methods to prevent identity theft.
Answer
Never share passwords, use strong passwords, and do not divulge personal information.
Question
Term: Spam
Answer
Definition: Undesired or illegal email messages sent in bulk.
Question
The protection of internet-connected systems, including hardware and software, from cyber attacks is called _____.
Answer
Cyber security
Question
A _____ is a form of malicious software program that can corrupt or destroy systems or data.
Answer
Virus
Question
According to the textbook exercises, what does 'Cyber law' primarily address?
Answer
Cyber crime
Question
True or False: Hacking is considered a cybercrime.
Answer
True
Question
True or False: Social networking sites are appropriate places to share secret information.
Answer
False
Question
Why is the cyber world reach more dangerous for identity theft than the real world?
Answer
It has a far larger reach, posing a more severe threat to a person’s reputation.
Question
What is the risk of using a fake profile on social networking sites?
Answer
It can be used to defame others and is an instance of cyber bullying.
Question
What is the main danger of 'lucrative offers' from unknown sources?
Answer
They are often unreliable and may be used for fraud or malware delivery.
Question
How should information read on social media be handled before forwarding?
Answer
It should be verified from a trusted source.
Question
What is the best way to handle 'nasty comments' or 'rumours' posted about you online?
Answer
Block the user, report the post, and talk to a trusted adult.
Question
Why is 'checking the URL' a specific defence against phishing?
Answer
Phishing sites often use URLs that look nearly identical to the actual website to deceive users.
Question
What is the consequence of being excluded from online groups and forums as a form of harassment?
Answer
It is considered a type of cyber bullying.
Question
What defines 'strong passwords' in the context of preventing identity theft?
Answer
Passwords that are difficult for others to guess or steal.
Question
Concept: Cyber World
Answer
Definition: An online environment where people share resources, connect, interact, and access information.
Question
In Activity 2, which protocol in a URL usually indicates a secure website?
Answer
https://
Question
What is the primary motive behind creating fake online profiles to target a specific individual?
Answer
To defame that person.
Question
Why should users avoid connecting with random people online?
Answer
Because it is difficult to recognise a person's true identity through the chosen online persona.
Question
What is the significance of the 'London 2012 Olympics' email example in the text?
Answer
It illustrates a common spam tactic of asking for personal information for a fake lottery prize.
Question
Identify the missing word: _____ often directs users to a fake website whose look and feel are almost identical to the actual website.
Answer
Phishing
Question
Match the term: Malware
Answer
Virus
Question
Match the term: Spamming
Answer
Email
Question
Match the term: Phishing
Answer
Stealing data
Question
What action should you take if you receive harmful messages on your computer?
Answer
Block or delete the sender.
Question
Why is it vital to remain updated with preventive security measures in the cyber world?
Answer
To effectively cope with the increasing complexities and threats of the online environment.