Skip to content
Practice Paper

icon picker
Answer key

Prepared by: learnloophq@gmail.com
Last edited 10 days ago by Learn LoopHQ.

Chapter: 08. Online Surfing And Cyber Security

Section A: Multiple Choice Questions

c) Google Drive
c) VoIP to VoIP calls are generally free.
b) To connect people with common interests and allow them to share ideas.
b) A criminal activity that uses computers to cause harm or steal data.
b) Shouting at the person.

Section B: Fill in the Blanks

global network
video conferencing
Danny Cohen
Data Diddling
cyber security

Section C: True or False

False
True
True
False
True

Section D: Explanations of Terms

Phreaking: This is a crime committed against telephone companies using computers, with goals like making free long-distance calls, impersonating operator services, or tapping phone lines.
Carding: This refers to the process of stealing credit card numbers online. These stolen numbers are then often resold or used to make unauthorized purchases against the victim’s account.
Cloud Storage: This is a service where users can store and manage their data on remote servers instead of saving it on their local computer or physical devices. It allows data to be accessed from anywhere with an internet connection.

Section E: Short Answer Questions

Two benefits of using e-greetings are that they save paper and trees, making them environmentally friendly. Additionally, they can look awesome with animation effects, music, and digital text, offering a dynamic way to send wishes.
Social networking services can be a distraction for students because they provide platforms for constant interaction and entertainment, which can lead to excessive time spent online, diverting attention away from studies and academic responsibilities.
A News Admin in a newsgroup manages the online discussion by keeping a check on participants’ comments. Their role includes deciding when to stop a discussion and approving comments or articles before they are posted on the newsgroup page.
Hacking involves gaining unauthorized access to a computer or account, which can sometimes be done ethically by professionals to test security. Cracking, however, is specifically the illegal act of breaking security systems to gain unauthorized access, usually with the intent to steal personal information or cause malicious harm.

Section F: Application-Based Questions

I would advise my sibling to always make sure the email’s subject line clearly states what the email is about, so the recipient understands its purpose immediately. It’s also very important to avoid typing anything in all capital letters because, in online communication, this is considered to be like shouting and can come across as rude or aggressive.
When joining an online gaming community, I would never provide any personal details like my real address, phone number, or school name. I would also ensure my browser’s privacy settings are always turned on, avoid sharing passwords with strangers, and never agree to meet anyone in person without my parents’ explicit permission and supervision.

Section G: Long Answer Questions

When teaching a new student about online safety, I would emphasize the following important measures:
Never share personal information: They should never give out their full name, address, phone number, or school details to anyone online.
Keep privacy settings on: Encourage them to always enable and maintain the privacy settings on their web browsers and social media accounts to control who sees their information.
Use the Internet with adult supervision: They should always use the Internet in the presence of an elder, like a parent or guardian, especially when exploring new sites or communicating with others.
Do not share passwords: Stress that passwords should be kept secret and never shared with anyone, except for their parents or teachers if absolutely necessary for legitimate reasons.
Never meet online strangers: Advise them against meeting anyone they have only known online in person without their parents’ explicit permission and supervision.
Don’t respond to unknown messages: Teach them not to reply to unknown emails, messages, posts, or texts, as these could be scams or harmful content.
Cyber security is the process of protecting computer resources, such as networks, devices, programs, and data, from unauthorized access, damage, or attack. Cyber crimes are increasing around the world due to several reasons:
Increasing use of the Internet: As more people and businesses rely on the Internet for daily activities, the potential targets and opportunities for cyber criminals expand significantly.
Lack of awareness: Many Internet users are not fully aware of the risks and best practices for online safety, making them vulnerable to various cyber threats like phishing or malware.
Existing loopholes in software: Software programs, even those from reputable companies, can have vulnerabilities or ‘loopholes’ that cyber criminals exploit to gain unauthorized access or cause disruptions.
Untrained Internet users: A large number of users lack adequate training on how to identify and avoid cyber threats, which contributes to the success rate of cyber attacks.
Want to print your doc?
This is not the way.
Try clicking the ⋯ next to your doc name or using a keyboard shortcut (
CtrlP
) instead.