0% found this document useful (0 votes)
263 views3 pages

Cyber Security Class 10

Uploaded by

uk7294701
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
263 views3 pages

Cyber Security Class 10

Uploaded by

uk7294701
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

B. Answer the following questions in short.

1. Define the cyberbullying.


Ans Cyberbullying is the use of technology to harass, threaten, or embarrass someone. It can
take many forms, such as sending mean messages, sharing embarrassing photos, or creating
fake profiles.

2. What is the function of an antivirus software?


Ans. An antivirus software scans your computer for malicious software (malware) like viruses,
worms, and Trojans. It identifies and removes or quarantines these threats to protect your data
and system from harm.

3. Explain the term backup. How is it useful?


Ans. Backup is a copy of your computer data stored elsewhere. It's useful because if your
computer crashes or data gets lost, you can restore your files from the backup. This prevents
data loss and helps you avoid starting from scratch.

4. Define Encryption/Decryption process.


Ans Encryption converts data into a secret code using a key. Decryption reverses this process,
using the same key to decode the encrypted data. This protects sensitive information from
unauthorized access.

5. How will you avoid slips and fall in a workplace?


Ans
In cybersecurity, avoid "slips and falls" by:
* Using strong, unique passwords.
* Being cautious of phishing emails.
* Keeping software up-to-date.
* Avoiding clicking on suspicious links.
* Backing up your data regularly.

C. Answer the following questions in long.

1. What is browser? Explain the working of browser.


Ans A web browser is a software application that allows you to access and view information on
the internet. It acts as a gateway to the World Wide Web, retrieving web pages, images, videos,
and other content from web servers and displaying them on your device.
Here's how a browser works:
* You enter a web address (URL) into the browser's address bar.
* The browser sends a request to the web server associated with that URL.
* The server processes the request and sends back the requested web page, which is typically
written in HTML (Hypertext Markup Language).
* The browser's rendering engine interprets the HTML code and displays the web page on your
screen.
* If the web page contains images, scripts, or other resources, the browser will download them
and incorporate them into the displayed page.
Popular web browsers include:
* Google Chrome
* Mozilla Firefox
* Safari
* Microsoft Edge
* Opera

2. Describe the safety measures while using computer and internet.


Ans Safety measures while using computers and the internet include:
* Regularly update your software and antivirus.
* Be cautious of phishing emails and suspicious links.
* Use strong, unique passwords.
* Avoid sharing personal information online.
* Be mindful of public Wi-Fi networks.
* Use a VPN for added privacy.
* Monitor your online activity and limit screen time.
* Take breaks and practice good posture.
* Protect your devices from physical damage.

3. How is the online backup system different from the offline backup system?
Ans Online backup systems store your data on remote servers, often in the cloud. This means
your data is accessible from anywhere with an internet connection. However, it requires a
constant internet connection and may have associated subscription fees.
Offline backup systems store your data on physical devices like external hard drives or USB
drives. These are typically stored locally, making them more secure against online threats.
However, they require physical storage and may be more vulnerable to accidental damage or
loss.
In summary, online backup offers convenience and accessibility, while offline backup provides
physical security and independence from internet connectivity.

4. Describe the types of accidents at workplace.


Ans In cybersecurity, accidents can also occur, often leading to data breaches and financial
losses. Here are some common types:
* Phishing Attacks: Deceptive emails or messages designed to trick individuals into revealing
sensitive information.
* Malware Infections: Malicious software like viruses, worms, or ransomware that can
compromise systems and data.
* Data Breaches: Unauthorized access to or theft of confidential information.
* Human Error: Mistakes made by employees, such as accidental deletions or sharing sensitive
data with unauthorized individuals.
* Social Engineering: Manipulating people into performing actions or divulging confidential
information.
* Supply Chain Attacks: Targeting third-party vendors or suppliers to gain access to a larger
organization's systems.
* Physical Security Breaches: Unauthorized access to physical facilities or equipment.
Preventing these accidents requires robust cybersecurity measures, employee training, and
regular risk assessments.

5. What do you understand by hazard? Explain its sources.


Ans. In cybersecurity, a hazard refers to a potential threat to the security of digital systems and
data. These threats can come from various sources, including:
* Malware: Malicious software like viruses, worms, and ransomware that can damage systems,
steal data, or disrupt operations.
* Phishing Attacks: Deceptive emails or messages designed to trick individuals into revealing
sensitive information.
* Social Engineering: Manipulating people into performing actions or divulging confidential
information.
* Human Error: Mistakes made by employees, such as accidental deletions or sharing sensitive
data with unauthorized individuals.
* Supply Chain Attacks: Targeting third-party vendors or suppliers to gain access to a larger
organization's systems.
* Physical Security Breaches: Unauthorized access to physical facilities or equipment.

You might also like