Monday, April 24, 2023

Class 10 English Solution New Course | Unit 7 Cyber Security: Basic Internet Safety- II

Unit 7
Class 10 English Solution New Course | Unit 7 Cyber Security: Basic Internet Safety- II

Reading II

Cyber Security: Basic Internet Safety

A. Match the words given below with their meanings.

a. possession- v. something that you own or have with you; belongingness

b. intertwined- viii. closely connected with somebody or something

c. integration- vii. the act of combining two or more things together

d. avoid- i. to prevent something bad from happening

e. sensitive- ii. quick to detect or respond to slight changes or signals

f. proliferated- ix. increased rapidly in number or amount

g. shielding- iv. protecting something from danger or harm

h. promptly- x. without any delay

i. authentication- vi. the act of proving that something is real or true

j. transaction-iii. an act of buying or selling; deal

B. State whether the following statements are true or false.

a. It is a good idea to use the same password in different accounts for safety purpose.


b. The teenagers are more vulnerable than any other age groups regarding the internet safety.


c. It is not safe to let the computer remember our passwords.


d. A cheap debit card is safer than the expensive one.


e. It is not safe to enable auto update of software in our devices.


f. We should never enter our financial details on websites.


C. Read the following paragraph headings and write the correct paragraph name (A-H) against them.

h. Protect your Personal Information with Strong Passwords- A

a. Keep your Personal Data Safe- B

c. Set up Two-factor Authentication-C

f. Pay Attention to Software Updates-D

e. Be Careful about WiFi-E

c. Set up Two-factor Authentication-F

b. Keep Personal Information Private-G

g. Back up your Personal Data-H

D. Answer these questions.

a. How do we try to protect our physical property?

To protect our physical property, we can take several measures such as using locks, alarms, security cameras, security guards, and insurance.

b. What should we do to keep our passwords secret?

To keep our passwords secret, we should create strong and unique passwords for each account, avoid using personal information in our passwords, change our passwords regularly, and never share our passwords with anyone.

c. Mention any two safety measures for shopping with debit cards.

- Shielding the PIN pad while purchasing with debit cards

- Using a chip debit card

d. How can we secure our accounts even when someone finds our password?

We can secure our accounts safe by adding the extra layer of security.

e. Why do you think we should make online friends only to familiar people?

We should make online friends only with familiar people because it can be risky to trust strangers online. Online friendships can be just as meaningful as in-person ones, but it's important to be cautious and protect our personal information. Some people may not be who they claim to be, and they could have malicious intentions.

g. What can we do to keep our online data safe?

We can keep our online data safe by using strong passwords, enabling two-factor authentication, being cautious about sharing personal information, using antivirus software, avoiding public Wi-Fi, regularly backing up data, and keeping software up to date with the latest security patches.

E. Have you ever lost your personal data and information while using the internet? Share your experiences in the class.

Grammar II

A. Complete the sentences below with articles a or an.

a. Doctor: What is your problem?

Patient: I have . . a.. . fever and I feel dizzy.

b. Would you like to in the future?

c. What ....a .. lovely garden you have!

d. We spent half in complete silence.

e. Please on our house while we are away.

f. Mr. Napit has brought ...a...ewe in his farm.

g. Ms Sharma's opinion was criticised as perspective.

h. We had to bus to be here on time.

B. Fill in the gaps in the sentences below with a, an or the.

a. Could you open ..the.. window, please?

b. Did you read I gave you last week?

d. All the desks were full. So we had to sit on ...the..floor.

e. Can you play...the.. flute well?

f. You have ...a..lovely house. I am particularly impressed by room.

g. ...The.....President is elected every five years in Nepal.

h. Do you think that the tourist is from Japan? No, she looks like...a..European.

i. This is ...the.. biggest fish I have ever caught in my life.

h. Bhartmani is known to be of action.

C. Fill in the blanks with the correct articles. If no article is used, put a cross (X).

a. Mrs. Paudel went to to meet her son's teacher.

b. What time did you get .....X..... home yesterday?

c. ....The....Netherlands consists of twelve provinces.

d. .....X...Everest is the pride of our country.

e. ...The...Nile is the longest river in Africa.

f. ...X....New Road is a financial hub in Kathmandu.

g. ....X..Aarohan Gurukul Theater was founded in 1982.

h. What did you have for ..X...breakfast this morning?

i. Braille system was developed to help ....the.. blind for reading and writing,

j. Do you always play...X.....badminton at school?

Writing II

Write a newspaper article on "Internet and Cyber Security". Use the following guidelines in your article.
Internet and Cyber Security

By Ranju Rana

March 7

In the modern era, the internet and technology have become an integral part of our daily lives. With the rise of digitalization, we rely on the internet for communication, shopping, banking, entertainment, and more. However, along with its benefits, the internet has also brought a number of security concerns.

The internet is a vast network that is prone to abuse. Cybercriminals and hackers use various tactics to gain access to personal information, steal identities, and disrupt systems. These abuses can have a significant impact on individuals, organizations, and society as a whole.

It is essential to prioritize data privacy and take measures to safeguard our digital lives. Data privacy refers to the protection of personal information and ensuring that it is not accessed, used, or shared without authorization. This can be achieved through various means, such as using strong passwords, installing antivirus software, and being mindful of the information that is shared online.

Moreover, it is crucial to be aware of the various tactics used by cybercriminals and hackers, such as phishing, malware, and social engineering. Phishing involves the use of fraudulent emails or websites to trick individuals into sharing sensitive information, while malware refers to malicious software that can infect systems and steal data. Social engineering involves the manipulation of individuals to gain access to sensitive information.

In conclusion, the internet has revolutionized the way we live our lives, but it also brings with it a host of security concerns. We must take measures to protect our personal information and be aware of the tactics used by cybercriminals and hackers. By prioritizing data privacy, we can safeguard our digital lives and ensure that the internet remains a safe and secure place for everyone.

No comments:

Post a Comment