NEB Class 12 Questions: NEB 12 Model Questions 2080/2024


NEB Class 12 Routine 2080-2081: Class 12 Routine

Cyber Security: Basic Internet Safety Tips - Unit 7 Lesson 2 Class 10 English

Class 10 English Guide 2080 Unit 7 Cyber Security, Lesson 2 Cyber Security: Basic Internet Safety Tips Exercise, Question Answer, Summary Grammar.
Class 10 English Guide 2080 Unit 7 Cyber Security, Lesson 2 Cyber Security: Basic Internet Safety Tips Exercise, Question Answer, Summary Grammar.

Cyber Security: Basic Internet Safety Tips

Class 10 English Guide 2080 Unit 7 Cyber Security, Lesson 2 Cyber Security: Basic Internet Safety Tips Exercise, Question Answer, Summary Grammar Writing Solution note.

Check: SEE Class 10 Model Question 2080/2081


Reading II


A. Match the words given below with their meanings.

a. possession i. to prevent something bad from happening

b. intertwined ii. quick to detect or respond to slight changes or signals

c. integration iii. an act of buying or selling; deal

d. avoid iv. protecting something from danger or harm

e. sensitive v. something that you own or have with you; belongingness

f. proliferated vi. the act of proving that something is real or true

g. shielding vii. the act of combining two or more things together

h. promptly viii. closely connected with somebody or something

i. authentication ix. increased rapidly in number or amount

j. transaction x. without any delay

Answer:

a. possession ➡ v. something that you own or have with you; belongingness

b. intertwined ➡ viii. closely connected with somebody or something

c. integration ➡ vii. the act of combining two or more things together

d. avoid ➡ i. to prevent something bad from happening

e. sensitive ➡ ii. quick to detect or respond to slight changes or signals

f. proliferated ➡ ix. increased rapidly in number or amount

g. shielding ➡ iv. protecting something from danger or harm

h. promptly ➡ x. without any delay

i. authentication ➡ vi. the act of proving that something is real or true

j. transaction ➡ iii. an act of buying or selling; deal


B. State whether the following statements are true or false.

a. It is a good idea to use the same password in different accounts for safety purpose.

b. The teenagers are more vulnerable than any other age groups regarding the internet safety.

c. It is not safe to let the computer remember our passwords.

d. A cheap debit card is safer than the expensive one.

e. It is not safe to enable auto update of software in our devices.

f. We should never enter our financial details on websites.

Answer:

a. It is a good idea to use the same password in different accounts for safety purpose. False

b. The teenagers are more vulnerable than any other age groups regarding the internet safety. False

c. It is not safe to let the computer remember our passwords. True

d. A cheap debit card is safer than the expensive one. False

e. It is not safe to enable auto update of software in our devices. False

f. We should never enter our financial details on websites. True


C. Read the following paragraph headings and write the correct paragraph name (A-H) against them.

a. Keep your Personal Data Safe

b. Keep Personal Information Private

c. Set up Two-factor Authentication

d. Make Sure your Devices are Secure

e. Be Careful about WiFi

f. Pay Attention to Software Updates

g. Back up your Personal Data

h. Protect your Personal Information with Strong Passwords

Answer:

A h. Protect your Personal Information with Strong Passwords

B a. Keep your Personal Data Safe

C c. Set up Two-factor Authentication

D f. Pay Attention to Software Updates

E e. Be Careful about WiFi

F c. Set up Two-factor Authentication

G b. Keep Personal Information Private

H g. Back up your Personal Data


D. Answer these questions.

a. How do we try to protect our physical property?

Answer ➡

We try to protect our physical property by applying several measures like using locks, alarms, security cameras, security guards, and insurance.

b. What should we do to keep our passwords secret?

Answer ➡

To keep our passwords secret, we should create strong passwords that are unique to each account, avoid including personal information in them, change them frequently, and never share them with anyone.

c. Mention any two safety measures for shopping with debit cards.

Answer ➡

Two safety measures for shopping with debit cards are as follows:

  • Shielding the PIN pad while purchasing with debit cards
  • Using a chip debit card 

d. How can we secure our accounts even when someone finds our password?

Answer ➡

We can secure our accounts safe by adding the extra layer of security.

e. Why do you think we should make online friends only to familiar people?

Answer ➡

We should make online friends only with familiar people because it can be risky to trust strangers online. Online friendships can be just as meaningful as in-person ones, but it's important to be cautious and protect our personal information. Some people may not be who they claim to be, and they could have malicious intentions.

f. What can we do to keep our online data safe?

Answer ➡

To keep our online data safe, we can do the following things.

1. Use strong passwords

2. Enable two-factor authentication

3. Be cautious about sharing personal information

4. Use antivirus software

5. Avoid public Wi-Fi

6. Back up data regularly

7. Keep software up to date with the latest security updates.

E. Have you ever lost your personal data and information while using the internet? Share your experiences in the class.

Answer ➡

Yes, I have lost my personal data and information while using the internet. Actually, I made mistakes that caused me to lose my personal data and information. My whole Google Cloud Drive data and information was destroyed. I successfully uploaded all of my files and information to Google Drive when I first used it. When I later attempted to retrieve the data I had uploaded, I was unable to determine the precise position of my data and information storage. I kept looking there in vain for all of my files. I terminated my Gmail account out of frustration, which wiped everything in the storage. After a few days, I received a suggestion from a buddy about how to use Google Drive. Thus, wiping everything from your drive with just one click is simple. When using the internet, we must exercise considerably greater caution.


Grammar II


A. Complete the sentences below with articles a or an.

a. Doctor: What is your problem?

Patient: I have . . a.. . fever and I feel dizzy.

b. Would you like to be.....an....actor in the future?

c. What ....a .. lovely garden you have!

d. We spent half ...an...hour in complete silence.

e. Please keep...an...eye on our house while we are away.

f. Mr. Napit has brought ...a...ewe in his farm.

g. Ms Sharma's opinion was criticised as having...a..one-dimensional perspective.

h. We had to catch...an....early bus to be here on time.


B. Fill in the gaps in the sentences below with a, an or the.

a. Could you open ..the.. window, please?

b. Did you read ...the...book I gave you last week?

d. All the desks were full. So we had to sit on ...the..floor.

e. Can you play...the.. flute well?

f. You have ...a..lovely house. I am particularly impressed by ....the...living room.

g. ...The.....President is elected every five years in Nepal.

h. Do you think that the tourist is from Japan? No, she looks like...a..European.

i. This is ...the.. biggest fish I have ever caught in my life.

h. Bhartmani is known to be ...a..man of action.


C. Fill in the blanks with the correct articles. If no article is used, put a cross (X).

a. Mrs. Paudel went to ...the...school to meet her son's teacher.

b. What time did you get .....X..... home yesterday?

c. ....The....Netherlands consists of twelve provinces.

d. .....X...Everest is the pride of our country.

e. ...The...Nile is the longest river in Africa.

f. ...X....New Road is a financial hub in Kathmandu.

g. ....X..Aarohan Gurukul Theater was founded in 1982.

h. What did you have for ..X...breakfast this morning?

i. Braille system was developed to help ....the.. blind for reading and writing,

j. Do you always play...X.....badminton at school? 


Writing Il


Write a newspaper article on "Internet and Cyber Security". Use the following guidelines in your article.

Introduction to the internet and technology

Use of the internet in our daily lives

The abuses of the internet

Need and ways of data privacy

Conclusion

Internet and Cyber Security

Answer:

16th, September

By Iswori.com.np

Internet and Cyber Security

The internet has become an essential part of our lives, but it is important to be aware of the potential risks and take steps to protect ourselves and our data.

Introduction to the internet and technology

The internet is a global system of interconnected computer networks that use the standard Internet protocol suite (TCP/IP) to link several billion devices worldwide.

It is a network of networks that consists of millions of private, public, academic, business, and government networks, of local to global scope, that are linked by a broad array of electronic, wireless, and optical networking technologies.

The Internet carries an extensive range of information resources and services, such as the inter-linked hypertext documents and applications of the World Wide Web (WWW), electronic mail, telephony, and file sharing.

Use of the internet in our daily lives

We use the internet for a variety of purposes in our daily lives, including:

  • Communication: We use the internet to stay connected with friends and family through social media, email, and video calls.
  • Work: Many people work remotely or use the internet for their jobs, such as for online meetings, presentations, and research.
  • Education: Students use the internet to access educational resources, take online courses, and collaborate with classmates.
  • Shopping: We can shop for almost anything online, from groceries to clothes to electronics.
  • Entertainment: We can watch movies and TV shows, listen to music, play games, and read books online.

The abuses of the internet

The internet can also be used for malicious purposes, such as:

  • Cybercrime: Cybercriminals use the internet to steal personal information, financial data, and other sensitive information. They may also launch ransomware attacks, which encrypt data and demand a ransom payment to decrypt it.
  • Misinformation: Misinformation and fake news are spread widely on social media platforms, which can erode trust in credible sources of information and disrupt public discourse.
  • Online harassment and bullying: People can be harassed and bullied online, which can have a significant impact on their mental and emotional health.

Need and ways of data privacy

As we increasingly share sensitive data online, it is important to protect our privacy. This includes safeguarding our personal information, financial details, and other sensitive data from misuse by malicious actors.

There are a number of ways to protect our data privacy, such as:

  • Using strong and unique passwords
  • Enabling two-factor authentication
  • Keeping software and devices up to date with the latest security patches
  • Being cautious about the information we share on social media and other online platforms

Conclusion

The internet has transformed our lives in many ways, but it is important to be aware of the potential risks and take steps to protect ourselves and our data. By following the tips above, we can minimize our risk of becoming victims of cybercrime and protect our privacy.

NEXT Chapter: Unit 8 Lesson 1: Common Habits


Read More

Class 10 English Notes - All Chapters 2080

Unit 7 Lesson 1: Parents

Unit 8 Lesson 2: Climbing

Unit 6 Lesson 1: Strange Foods From Around The World

Unit 6 Lesson 2: You Inspire Others By Learning, not by Teaching

About the Author

Iswori Rimal is the author of iswori.com.np, a popular education platform in Nepal. Iswori helps students in their SEE, Class 11 and Class 12 studies with Complete Notes, important questions and other study materials.

Post a Comment

AdBlock Detected!
We have detected that you are using adblocking plugin in your browser.
The revenue we earn by the advertisements is used to manage this website, we request you to whitelist our website in your adblocking plugin.
Site is Blocked
Sorry! This site is not available in your country.