Revision QuestionsIX
Revision QuestionsIX
CYBER SAFETY
I.Tick (√) the correct option.
2. When visiting sites where you win something or they are giving something away
a. Give your name, phone number, and address
b. Give parents information
c. Give no personal information
d. Give whatever information they request
3. ____________ is a fraudulent practice of directing Internet users to a bogus website that mimics the
appearance of a legitimate one.
a. Virus
b. Malware
c. Pharming
d. Chatting
5. ______________ monitors user activity and transmit that information in the background to someone else.
a. Malware
b. Spyware
c. Adware
d. None of these
2. What is Cyberstalking?
Answer. Cyberstalking is a crime in which the attacker harasses a victim using electronic communication,
such as e-mail or instant messaging (IM), or messages posted to a social networking site and chat site. A
cyberstalker, using anonymity allow them to stalk their victim without being detected.
4. State three points that you should remember while selecting a password.
Answer. While selecting passwords the following points are to be remembered:
• The longer the password, the harder it is to crack. Consider a 12-character password or longer.
• Avoid names, places, and dictionary words.
• Mix it up. Use variations on capitalization, spelling, numbers, and punctuation.
• You may also use a specialized Password Manager package; as ultimately the number of passwords that
you need to remember will grow.
5. What is Pharming?
Answer. Pharming refers to the fraudulent practice of directing Internet users to a bogus website that
mimics the appearance of a legitimate one, in order to obtain personal information such as passwords,
account numbers, etc.
6. List two methods by which you will be able to identify malicious websites.
Answer. The following are the list of malicious, criminal or inappropriate websites:
• Check for presence of an address, phone number and/or email contact – often indications that the
website is genuine. If in doubt, send an email or call to establish authenticity.
• Check that the website’s address seems to be genuine by looking for subtle misspellings, extra words,
characters or numbers or a completely different name from that you would expect the business to have.
• Roll your mouse pointer over a link to reveal its true destination, displayed in the bottom left corner of
your browser. Beware if this is different from what is displayed in the text of the link from either
another website or an email.
7. Give four methods by which you will be able to safely use a social networking site.
Answer. The following list should be followed for using the social networking safely:
• Use a strong password. The longer it is, the more secure it will be.
• Use a different password for each of your social networking accounts and try changing it frequently.
• Set up your security Answers which available with social networking sites.
• If you have social networking app on your phone, be sure to password protect your device.
8. What do you understand by Identity protection? Give three steps you should take to protect from
theft.
Answer. Identity protection refers to the protection of personally identifiable information, such as
Aadhar Card Number, Credit/Debit Card Number, bank account number, username or password by an
imposter in order to impersonate someone else. Identity fraud can be used to obtain credit, merchandise
and services in the name of the victim, or to provide the thief with false credentials.
Some of the steps you should take to protect your identity from theft are:
1. Protect your computer and smartphone with strong, up-to-date security/anti-malware
Software. This is because if your computer or phone is infected with malicious software, other safeguards
will be of little help.
2. The Operating System should also be regularly updated with different security patches and service
packs as this will decrease the possibility of the security breach.
You should be able to spot spam and scams. Although some phishing scams are easy to identify, other
phishing attempts in email, Instant Messaging, on social networking sites, or websites can look very
legitimate. You should never click on a link that has been sent to you, if you have no idea about the
source.
9. What do you understand by confidentiality of information? State the best practices to ensure
confidentiality.
Answer. Confidentiality of information is defined as information to which the public does not have
general access. This policy governs the use or further disclosure of such information.
Best practices used to ensure confidentiality are as follows:
• An authentication process, which ensures that authorized users are assigned confidential user
identification and passwords. Another type of authentication is biometrics.
• Role-based security methods may be employed to ensure user or viewer authorization. For example,
data access levels may be assigned to specified department staff.
• Access controls ensure that user actions remain within their roles. For example, if a user is
authorized to read but not write data, defined system controls may be integrated.
a. When you are making up a user name for email and instant messaging, you should:
i. Always use your real name.
ii. Use a name that does NOT reveal your true identity.
iii. Use a name that gives good clues about who you really are.
Answer.ii. Use a name that does NOT reveal your true identity.
Answer. iii. Never give out your passwords, except to your parents.
c. When someone asks for personal information like phone numbers or addresses online, you should:
i. Give the information to anyone who asks because it’s the polite thing to do.
ii. Post the information on any public Web site like MySpace, so anyone can find it.
iii. Never give out personal information online in emails or instant messages because you
never know who you are really communicating with.
Answer. iii. Never give out personal information online in emails or instant messages because you never
know who you are really communicating with.
d. When you are filling out forms or surveys online, you should:
i. Answer all the questions truthfully.
ii. Before you Answer any questions, you should get your parents’ approval.
iii. Make up funny Answers to all the questions.
Answer. ii. Before you Answer any questions, you should get your parents’ approval.
2. Shobhit felt that he had been a victim of cyberstalking for a long period of time. Give 4 steps you
should take for reporting cybercrimes.
Answer. Here are few steps you should keep in mind for reporting cybercrimes:
• The first step is to register a written complaint to the immediate cyber cell in the city. The Information
Technology Act categorically provides that a cybercrime has global jurisdiction, meaning that the crime
may be reported in the Cyber Crime Units of any city, irrespective of the place where the act was
committed. At the time of filing of the complaint, the person reporting the crime may also be required to
provide their name, contact details and mailing address along with the application, which is to be
addressed to the Head of the Cyber Crime Cell of the city.
• In case of non-availability of cyber-cells in the city, one can file a F.I.R. in the local police
station, commissioner or judicial magistrate of the city.
• Offences covered by the Indian Penal Code may also be reported at a local police station by lodging a
First Information Report (FIR) irrespective of the jurisdiction in which the offence was committed.
• A report should also be send to the administration of the website for them to take immediate steps.
Most social networking websites have a procedure in place for reporting any abusive activity or other
such alleged offence.
3. Mr Swapan wants to secure his profile in a Social Networking site. To do this, he needs to change
some privacy settings of his profile in the social Networking site. Suggest some privacy settings that
will safe guard his identity.
Answer. Some of the common privacy settings associated with social networking sites are:
• The default privacy settings is “Public” , which may also be “Friends” or “Custom. The first two options
are good for someone who has a small group of friends they don’t mind sharing everything with or who
has no personal identifying information on their profile and doesn’t mind it all being public. But for those
of us who want a little more control over exactly who
sees what on our profiles, it’s time to familiarize yourself with the “Custom” option.
• How You Connect– This section allows you to change how people find you, who can post to your wall
and who sees what information on your wall.
• How Tags Work– This option controls who can tag you in pictures, you can see the pictures you’re
tagged in and who can tag people in the pictures that you post. By default, Facebook shows the pictures
you are tagged in publicly, even if you do not have a public wall.
• Apps and Websites– This section controls the third party apps that are allowed to access and interact
with your profile without compromising it.
• Privacy of each post- This option is for convenience where each time you make a post, you can choose if
that post is public, only to friends, only to you and more. You can even set it to show only to certain lists
that you have.
4. Which view button listed below is not one of those available in the workspace?
a) Normal view
b) Outline view
c) Thumbnail view
d) Notes
5. Which view is generally used for creating, formatting and designing slides?
a) Normal view
b) Outline view
c) Notes
d) Slide Sorter view
6. The slide show can be exited at any time during the show by pressing which of the following
keys?
a) Space bar
b) End key
c) Break key
d) Esc key
7. Which of the following features is used to create a new slide show with the current
Slides but presented in a different order?
a) Rehearsal
b) Custom slide show
c) Slide show setup
d) Slide show view
8. Which of the following features is used to progress the slide show automatically while speaking
on the topic?
a) Custom Animation
b) Rehearse Timing
c) Slide Transition
d) Either (a) or (b)
Question-Answers
1. List the possible multimedia contents that are included while creating a presentation.
Answer – The following is a list of possible multimedia content to include while building a presentation:
Slides
Videos
Audios
Images
Animation
a. Create a consistent and simple design template with the slide master function.
b. Reduce the quantity of words on each screen by simplifying and limiting them.
c, Use different colors for the text and the background. It’s ideal to use light writing on a dark
background.
Answer – It’s easy to engage your audience with a presentation. Clear bullet points or summary language
can help an audience follow the logic of a presentation, while beautiful graphics can hold an audience’s
attention.
4. What objects can be inserted to slides in Impress?
Answer – Impress allows you to embed a variety of objects into a slide, including music or video clips,
Writer documents, Math formulas, generic OLE objects, and so on. The primary window of Impress is
divided into three sections: the Slides pane, Workspace, and Sidebar.
The Title Bar, Menu, Toolbars, and Status Bar are all part of the Impress window. These sections are
comparable to the main Writer window. Normal, Outline, Notes, Handout, and Slide Sorter are the five
tabs in Impress.
Answer –
Step 1: Click on Page Drop.
Step 2: Tap the Header or Footer button.
Step 3: From the popup menu, select Edit Header or Edit Footer.
Step 4: On the Ribbon, the tab Interface Header & Footer Software appears.
Step 5: Insert the insertion point where you want a header or text footer to appear.
step 6: press the (Enter) key.
Answer – In a word document, the header is the top margin and the footer is the bottom margin.
a. The headers and footers are used to provide additional information about the document for
convenience of processing.
b. The page number, as well as the document’s name or title, we can be used as headers.
c. The author’s name, date and time of creation, and other information may be included in the footer.
d. These two fields, on the other hand, allow the usage of graphics such as the corporate logo.
1. Normal view – This view allows you to work on a single slide at a time, adding and designing
innovative styles. This default mode allows you to simultaneously see and work on the presentation.
2. Slide sorter view – This view allows you to change the properties of the slides. The slide sorter view
shows a scaled-down version of the slide and allows you to quickly delete or rearrange other slides.
3. Reading view – This feature makes it easier to see the presentation on a different computer. The
reading perspective, rather than viewing the presentation in full screen, allows you to easily access the
meeting controls while presenting the slides.
4. Slide Show view – This view is mostly used to show the presentation to the audience on a full screen.
This view shows the transition effects and slide timings.
5. Presenter view – This view allows two devices to be linked to show the presentation, such as a
projector and a laptop.
I. Crossword
Clues
Across
2. It is defined as a collection of cells arranged vertically from the top to bottom of the Calc application
window.
4. It is an electronic document that lets you organise data in a grid of horizontal rows and
vertical columns.
8. It displays the name of the active cell or the selected range of cells.
9. This function is used to calculate the arithmetic mean of the given values.
10. This is the main area in the Calc window where you enter the data and perform calculations.
Down
1. This feature enables you to fill a range of cells with the series data automatically instead of
typing it.
3. It is located on the right of the Name box and displays the contents of the active cell.
5. This feature allows you to view the worksheet printed on-screen before printing the final
output.
6. It is defined as the intersection of a row and a column.
7. It is defined as the pre-defined formula in OpenOffice Calc that helps you to do calculations.
Answer.
Application-oriented Questions
1. In a spreadsheet software, the formula in cell A2=B2+C3. On copying this formula to cell
C2, what will the formula be?
Answer. The formula in cell C2 will be =D2+E3
2. What will be the cell address of the cell formed by the intersection of the fifth column and
the eighth row?
Answer. The cell address will be E8
4. In the spreadsheet shown below, cells A3 and B3 contain numbers, and cell C3 contains a
formula.
6. NewStyle Fashions maintain their employee salary details in a spreadsheet. A sample data of
seven employees is shown below.
Write formulas for the operations (a) to (c) and answer the questions (d) to (g) based on the
spreadsheet given below along with the relevant cell
address.
(a) To calculate the DA as 25 % of BASIC+HRA for each employee and display in column D.
(b) To calculate the NET SALARY as BASIC+HRA+DA–PF for each employee and display in
column F.
(c) To find the maximum NET SALARY and display in cell F9.
(d) The manager wants to know how many employees from the above data are eligible for
bonus. The criteria being that the employees having a net salary greater than 75000 are
not eligible for bonus. Write the formula the manager should use for achieving the same
and display the number of employees in cell F10.
(e) The manager inserts a column for S.No. in the above spreadsheet. Which feature will
help him automate the typing of sequential numbers in this column?
(f) The manager wants to graphically represent a comparative analysis of the salaries of
employees. Suggest the most suitable chart type for achieving the same.
(g) If the basic salary of an employee changes, will the manager have to redo all the
calculations for that particular employee? Explain.
Answer.
(a) Insert the formula =(B2+C2)*25% in the cell D2 and copy it in the cells D3 to D8.
(b) Insert the formula =SUM(B2:D2) - E2 in the cell F2 and copy it in the cells F3 to F8.
(c) Insert the formula =MAX(F2:F8) in the cell F9.
(d) Insert the formula =COUNTIF(F2:F8;“<=75000”) in the cell F10.
(e) AutoFill
(f) Column Chart (or Bar Chart)
(g) No. A spreadsheet package automatically recalculates the formulae whenever
there is any change in the spreadsheet data.