Anjeev Singh Academy

Anjeev Singh Academy

Class 9 Computer Application 165 Chapter 6 Cyber Safety Sumita Arora Solution

Class 9 Computer Application 165

Chapter 6 Cyber Safety

Sumita Arora Book Exercise Solution

Que 1. What makes a secure password? (a) A secure password should be one that you will easily remember (b) A secure password should be one that you will easily remember and be a mixture of upper-case and lower-case letters, numbers, and characters (c) A secure password should be something familiar like a birthday or a pet’s name

Answer: (b) A secure password should be one that you will easily remember and be a mixture of upper-case and lower-case letters, numbers, and characters

Que 2. What is the purpose of anti-virus software? (a) To prevent a virus from attacking the network (b) To prevent hackers from accessing the network (c) To block unauthorized connections to the network

Answer: (a) To prevent a virus from attacking the network

Que 3. Which of the following are types of malicious software? (a) Viruses, worms, adware, trojans and spyware (b) Word processing packages (c) Anti-virus software

Answer: (a) Viruses, worms, adware, trojans and spyware

Que 4. How do you know if a website is secure? (a) When you visit the site, a message appears telling you it is secure (b) The prefix of the website is HTTPS (c) Websites cannot be made secure

Answer: (b) The prefix of the website is HTTPS

Que 5. When accessing a website, which icon can be seen in the address bar to indicate that the website is Secure? (a) Arrow (b) padlock (c) shield (d) house

Answer: (b) padlock

Que 6. What is the purpose of a firewall? (a) To detect viruses on a system and prevent them from attacking it and spreading (b) To prevent unauthorized connections coming into and out of a network (c) To prevent a hacker from logging on to the network

Answer: (b) To prevent unauthorized connections coming into and out of a network

Que 7. What is cyber safety? Why is it important?

Answer: Cyber Safety means using of internet safely and responsibly. It ensures the safety and security of personal information and does not pose a threat to anyone else’s information.

Importance of Cyber Safety:

  • Cyber safety involves gaining knowledge about possible threats to personal safety and security risks for the information.
  • Cyber safety provides the measures to prevent and counter cyber threats.

Que 8. What should you do to protect your identity on the Internet?

Answer: To protect your identity on the internet, You can use the following solutions-

  • (a) Private Browing
  • (b) Anonymous Browsing

Que 9. How do websites track you online?

Answer: Websites track you online through –

  • Cookies and Tracking Scripts
  • HTTP referrer
  • Super Cookies

Que 10. What are cookies? How are they used by websites to track you?

Answer: Cookies are small text files on your computer storing small pieces of information related to your online habits.

Cookies are used in various ways to track your information:

  • When you log in to your online banking website, a cookie remembers your login ID and password.
  • When you change a setting on a website, cookie stores that setting, and next time open the website with the new setting.
  • Cookies also store information about your search history and web browsing history, to show the advertisement as per your interest.

Que 11. What is Private browsing? Why is it considered a better way of browsing the Internet?

Answer: A type of browsing wherein the browser opens in incognito mode and does not store cookies about your online activity, is called Private browsing.

Private browsing is considered a better way of browsing the Internet, because

  • In Incognito browsing, the browser does not track your activity.
  • It does not store your bank information.
  • It does not keep the browsing history and searching history.

Que 12. Why are passwords considered an important safety tool?

Answer: Passwords are an important tool of protection for you online. You can enter into an account only if you know the correct password. It works as a key, which gives permission to access your online account.

A strong password is considered an important safety tool, because

  • Keep your personal information safe.
  • Protect your emails, files, and other content.
  • Prevent someone from breaking into your account.

Que 13. What should you keep in mind while choosing an effective password?

Answer: Choosing effective passwords is very crucial, so when choosing an effective password you must keep in mind the following things:-

  • No dictionary words or proper nouns.
  • No personal information.
  • Use longer passwords.
  • Use a combination of capital and lowercase letters, numbers, and special characters.
  • Use passphrases to remember complex passwords.
  • Do not repeat passwords on different websites.

Que 14. What is the confidentiality of information? How do you ensure it?

Answer: Confidentiality of Information ensures that only authorized users get access to sensitive and protected data.

Confidentiality of Information can be ensured by using the following practices:-

  • Use a firewall to monitor all communications and trap all illicit packets.
  • Change the browser settings and block the tracking of your computer by using third-party cookies.
  • Use Private browsing.
  • Always ensure safe sites while entering any crucial information.
  • Avoid using public computers.
  • Don’t share your confidential information on wireless networks.
  • Erase history which using public computers.
  • Don’t save passwords and login information.
  • Always log out before leaving the computer.

Que 15. What is a computer virus? How can it affect your computer?

Answer: Computer viruses are malicious codes/programs that cause damage to data and files on a system.

Viruses can attack any part of a computer’s software such as the boot block, operating system, system areas, files, and application program macros.

Que 16. Why is antivirus software considered important?

Answer: Antivirus software helps to detect and eliminate any malware.

Antivirus software is important to protect your devices such as computers, laptops, or mobiles from malicious software that can corrupt your files and data.

Que 17. What type of damage can be caused by viruses to your computer?

Answer: Damage caused by Viruses:-

  • Damage or delete files.
  • Slow down your computer.
  • Can fill all the disk space or memory.
  • Can spy on your activity.
  • Can alter PC settings.

Que 18. What is Malware? What type of damage can they cause to your computer?

Answer: Malware is a general term used to refer to viruses, worms, spyware, adware, etc. In other words, it is unwanted software that someone else wants to run on your computer.

Malware infects your computer, making it behave in a way, that you do not approve of.

Damage Caused by Malware:

  • Invade your email program.
  • Alters PC settings.
  • Slow down your PC.
  • Adware tracks information,
  • Displays arrays of annoying advertising

Que 19. What is the significance of a firewall in a computer’s security scheme?

Answer: A firewall is a program that monitors all communications, i.e. monitors both incoming and outgoing communication and traps all illicit packets.

The firewall helps to secure the system from unauthorized communication, such that only authentic users can connect to the computer.

Que 20. What is cybercrime? How can you report it?

Answer: Cybercrime is any criminal offense that is facilitated by, or involves the use of, electronic communications or information systems, including any electronic device, computer, or the Internet.

The term, cybercrime, is a general term that covers crimes like phishing, credit card fraud, illegal downloading, industrial espionage, child pornography, cyberbullying, cyberstalking, cyber terrorism, creation and/or distribution of viruses, spam, and so on.

Que 21. What are cyberbullying and cyberstalking?

Answer: Cyber Bullying:

Harassing, demeaning, embarrassing, defaming, or intimidating someone using modern technologies like the Internet, cell phones, instant messengers, social networks, etc., is called Cyber Bullying.

Cyber Stalking:

Cyber Stalking is a kind of online harassment wherein the victim is subjected to a barrage of online messages and emails.

Related Posts

Cbse class 9 computer application 165 question answer, class 9 computer application chapter 1 computer system sumita arora book exercise solution, class 9 computer application chapter 2 types of hardware sumita arora book solution, class 9 computer application ch 7 openoffice writer i book solution, class 9 computer application ch 8 openoffice writer ii sumita arora solution, class 9 computer application 165 chapter 3 types of software sumita arora solution, class 9 computer application 165 chapter 4 basic of operating systems sumita arora solution, class 9 computer application 165 chapter 5 computer networking multimedia basics sumita arora solution, class 9 computer application presentation tool openoffice impress sumita arora solution, class 9 computer application spreadsheet tools oo calc i sumita arora solution, thanks for visiting.

Visit my another website www.mycstutorial.in  for 5000+ mcq’s and question answer of Info. Tech. [402], Computer Application [165], Computer Science [083], Informatics Practices [065] and Sample Papers.

Sorry! You cannot copy content of this page. Please contact, in case you want this content.

Study Rankers

NCERT Solutions for Class 9th: Ch 6 Security threats and Safety Measures Computer Science

Contact form.

Cyber Safety

Class 9 - kips cyber beans cbse computer code 165, multiple choice questions.

............... is a social identity that a user establishes during online communities and websites.

Internet identity

  • Personal identity
  • Login Information
  • None of these

Reason — Internet identity is a social identity that a user establishes during online communities and websites.

............... is a technique used to fetch personal details of a user from his discarded documents.

Dumpster Diving

  • Shoulder surfing
  • Identity Theft

Reason — Dumpster Diving is a technique used to fetch personal details of a user from his discarded documents.

Name the tool which is used for tracking and reporting the traffic received on a particular website.

  • Google Chrome

Google Analytics

  • Google Engine

Reason — Google Analytics is used for tracking and reporting the traffic received on a particular website.

Which key combination launches the private mode in Firefox?

Ctrl + Shift + P

  • Ctrl + Shift + N
  • Ctrl + Shift + F

Reason — Ctrl + Shift + P key combination launches the private mode in Firefox.

............... is a technique used to gather web pages across the web and feed them into search engines for web indexing.

Reason — Spidering is a technique used to gather web pages across the web and feed them into search engines for web indexing.

............... is a software which keeps a track of all your activities and sends your confidential information to hacker.

Reason — Spyware is a software which keeps a track of all your activities and sends your confidential information to hacker.

............... involves an attack coupled with a demand for money to stop further attacks.

Cyber stalking

Cyber extortion

  • Cyber bullying

Reason — Cyber extortion involves an attack coupled with a demand for money to stop further attacks.

Which one of the following is not a password cracking technique?

  • Dictionary Attack

Reason — User agent refers to the software program, such as our browser or a session initiating application. It is not a password cracking technique.

In which year Cyber law was introduced?

Reason — With the increase in number of crimes related to the Internet, urgent need was felt to introduce an act of law against such crimes. With this view in mind, the Indian Government introduced Information Technology Act 2000 on October 17, 2000.

Question 10

Mention the cyber crime in which the attacker harasses a victim by using the electronic communication.

  • Cyber espionage
  • Cyber warfare

Reason — Cyber stalking is a cyber crime in which the attacker harasses a victim by using the electronic communication.

Question 11

Which software is designed to capture keystrokes without being identified by the user or security program?

Reason — Keyloggers software is designed to capture keystrokes without being identified by the user or security program.

Question 12

Name the malware program that send unwanted advertisements to the user's computer which may disrupt user's working.

Reason — Adware is a malware program that sends unwanted advertisements to the user's computer which may disrupt user's working.

Question 13

Which program can create multiple copies of itself and can consume large portion of system memory?

  • Trojan horse

Reason — Worm can create multiple copies of itself and can consume large portion of system memory.

Question 14

Which type of cookies, websites store to get details of a user's search history and the web browsing history?

  • First party cookie

Third party cookie

  • Session cookie

Reason — Third party cookies are stored by websites to get details of a user's search history and the web browsing history.

Question 15

When we enter the password, which text box displays password strength?

Strength text field

  • Password text field
  • User name text field

Reason — When we enter the password, the Strength Text field box displays password strength.

Question 16

Which program sends message to the user system that the system is locked and the user will not be able to work on it until one pays a certain amount.

Reason — A Ransomware program sends message to the user system that the system is locked and the user will not be able to work on it until one pays a certain amount.

Question 17

Name the software that helps the other malware to enter in your system and harm it.

Reason — Backdoors help the other malware to enter in our system and harm it.

Question 18

Which of the following are the types of malicious software?

  • Anti-virus software

Viruses, worms, trojans

  • Word Processing packages

Reason — Malware is a malicious program that enters into a computer and damages it without the user's knowledge. These softwares include viruses, worms and trojans.

Question 19

Which one of the following is not the best practice to protect the confidential information?

  • Use multifactor authentication

Slowing down the network speed

  • Use Firewall
  • Engage in Safe web browsing

Reason — Slowing down the network speed is not the best practice to protect the confidential information.

Fill in the Blanks

............... is the process of stealing confidential, personal information, and financial information.

Cyber theft is the process of stealing confidential, personal information, and financial information.

VPN stands for ............... .

VPN stands for Virtual Private Network .

The two common cyber crimes are ............... and ............... .

The two common cyber crimes are Cyber stalking and Cyber bullying .

............... is temporary in nature.

Session cookie is temporary in nature.

............... are permanently stored on your system.

Super cookies are permanently stored on your system.

To prevent tracking of browsing history, we can use ..............., ............... or ............... .

To prevent tracking of browsing history, we can use Proxy server , Incognito browsing or VPN .

A ............... is a dedicated computer or a software system which acts as an intermediary between an end point device, such as a computer, and another server.

A Proxy server is a dedicated computer or a software system which acts as an intermediary between an end point device, such as a computer, and another server.

A VPN allows you to hide your true identity by ............... the data and web traffic.

A VPN allows you to hide your true identity by encrypting the data and web traffic.

Turning your ............... settings to "off" can keep your family's where-about more private.

Turning your GPS location settings to "off" can keep your family's where-about more private.

............... and ............... can serve in cutting your data charges and are helpful in completing work efficiently.

Open Wi-Fi and Hotspot can serve in cutting your data charges and are helpful in completing work efficiently.

A ............... is just like a key to your personal information.

A password is just like a key to your personal information.

A password should be minimum ............... characters long.

A password should be minimum eight characters long.

The strength of a password is determined by length, complexity and ............... .

The strength of a password is determined by length, complexity and unpredictability .

............... is a technique similar to the Dictionary attack but with a little difference that it detects the password using algorithm.

Brute force attack is a technique similar to the Dictionary attack but with a little difference that it detects the password using algorithm.

The term ............... describes a person actively involved in online communities or the Internet in general.

The term Netizen describes a person actively involved in online communities or the Internet in general.

In Windows operating system, the ............... keeps track of a system's hardware and software.

In Windows operating system, the registry keeps track of a system's hardware and software.

Theory Questions

How can you prevent the entry of virus into your system?

We can prevent the entry of virus into our system by following the given safety measures:

  • Security Programs — The anti-virus should be regularly updated. It should also be programmed to regularly scan and quarantine the system.
  • Secure Internet access — Be vigilant when accessing or uploading information on the Internet. Only secure sites should be used for financial transactions and no personal information should be shared.
  • Regular security updates — Keep applications and operating system updated at all times. Special attention should be paid to security updates and security bulletins for each software or application being used.
  • Avoid Spams — Mails from un-wanted and un-warranted sources should be deleted without reading or downloading. Any attachments in such mails should never be downloaded or installed onto the system.
  • Scanning All Portable devices — Scan all portable storage devices before use as these are the most common sources of infection in computers.

How are the first party cookies different from third party cookies?

First party cookies are generally used to store our login id, password, autofill information etc. for the frequently visited websites.

Third party cookies are the cookies that websites store to get details of our search history and web browsing history. These are most often used by advertising companies to track us across multiple websites that we visit.

What do you mean by Cybercrime?

Cybercrime refers to any online illegal activity facilitated by the use of electronic communication devices like mobile phones, computers or through networks like the Internet. For example, cyberstalking, cyberbullying, cyberespionage, cyberwarfare, etc.

What precautions should be taken to safeguard one's online identity?

Some of the precautions that one should take to safeguard their online identity are:

  • Exclude important personal information like phone number, address, school name, etc. from our social media profiles. Be selective in adding friends and hitting like button.
  • Turning our GPS location settings to "off" from our phone's privacy settings to keep our where­abouts more private.
  • Watch out for 'phishing' e-mails. Never react to any messages with account data or passwords. Delete the email.
  • Use strong passwords that are a combination of letters, numbers and special characters.
  • Use Private browsing/Incognito Mode that helps us to prevent saving of our details as in the autofill feature, browsing history, data in cookies and location tracking.
  • Add an extra layer of security by using multi-factor authentication for important online accounts like email, social media, bank accounts, etc.

How does a proxy server work to protect your data?

A proxy server is a dedicated computer or a software system that runs on a computer and acts as an intermediary between an endpoint device, such as a computer and another server from which a user or client is requesting a service. So, the tracking website will get the information on the proxy server and we can still browse the site without disclosing our IP address or location.

What do you mean by Cyber terrorism?

Cyber terrorism is the act of conducting terrorism through the use of computers and the internet in order to cause fear and panic. Cyber terrorism involves large scale disruption of computers, telecommunication networks, or information system so as to compel the government or its people to fulfill some social, religious, or political objectives. Attacks on military installations, power plants, air traffic control, banks, etc. are some examples of cyberterrorism.

How firewall can safeguard your data on the network?

A firewall is a security system that regulates network traffic based on set rules, using hardware, software, or a combination. It safeguards our computer system and data from any unauthorized external source. It blocks all unauthorised users and doesn't allow them to gain access to our data.

What is Phishing?

Phishing is the act of illegally acquiring personal and sensitive information such as, online banking details, credit card details, and other login details, of an individual by sending malicious e-mails or by creating web pages that can collect this information as they appear to come from very famous organizations.

How can you check that the website you are visiting is open in secure mode?

The URL of a secure website begins with "https" rather than "http". Also, the Internet browsers display a padlock icon in address bar to indicate that the website is secure. These checks help ensure that the website is opened in secure mode.

Application Based Questions

While working, Mrs Sharma's system stopped functioning suddenly. After her system got repaired, she tried to log in to her e-mail account but could not do so. There was an error of incorrect user name or password.

a. What might be the reason for this?

b. How do you think her password might be altered, if at all?

c. What precautions she should have taken to protect her login details?

a. The reason might be that Mrs Sharma's email account got hacked and the hacker changed her password locking her out of her email account.

b. Mrs. Sharma may have used the web browser's auto-login feature, which saves her username and password for automatic website login. While her system was undergoing repairs, an unauthorized individual could have gained access and altered her password.

c. Mrs. Sharma should have taken the following precautions to protect her login details:

  • She should have enabled multi-factor authentication for her email account adding an extra layer of security.
  • She should avoid using the auto login and remember password functionality of the web browsers.

Nimmi is planning to spend her vacations abroad and surfed the internet to get details about some of the places. Now she keeps getting e-mails from various unknown sources regarding travel, tourism, hotel booking, etc. What could have been the reason for this and how can she prevent it?

The reason Nimmi is receiving these emails is likely due to sharing of e-mail id. Nimmi must have shared her mail id with websites while surfing the internet to get details about various locations for vacation. She might have unknowingly subscribed for newsletters as well.

To prevent receiving such unsolicited emails, Nimmi can take the following steps:

  • Unsubscribe — Check the emails she receives for an "unsubscribe" link.
  • Be cautious while sharing her mail address — When filling out forms on websites, avoid providing personal information like mail id unless absolutely necessary.

Aakriti copied a game from her friend's system into her laptop. But after she executed this game, some of the data from her laptop was lost. What kind of malware do you think it is and what precautions should be taken to work with it?

The malware that infected Aakriti's laptop is a Trojan Horse . At first glance, the Trojan Horse seems to be useful but once it is activated, it harms the system by deleting files or by modifying useful information.

Aakriti can take the following precautions to safeguard her system from malware:

  • Scanning All Portable devices — All Portable devices should be scanned before use.
  • Security Programs — Installing reliable anti-virus software and updating it regularly is essential.
  • Regular security updates — Keep applications and operating system updated at all times.
  • Backups — Taking backups regularly is a good practice. This not only protects us against data loss but also helps to restore the integrity of the data.

Long Answer Type Questions

What do you mean by online identity? List some threats to your online identity.

Online identity is a social identity that an internet user establishes in online communities and websites.

Some threats to our online identity are as follows:

  • Phishing — It is the illegal acquisition of personal and sensitive information (such as, online banking details, credit card details, and other login details) through deceptive emails or fake web pages that mimic well-known organizations.
  • Dumpster Diving — It is a method cybercriminals use to obtain personal information from discarded documents like bills, credit cards, and passwords, which they can then exploit to steal the online identity of the targetted person.
  • Shoulder Surfing — It is obtaining personal information, such as a PIN at an ATM machine, personal details while filling up a form, or the lock code of a smartphone through direct observation by looking over a person's shoulder.
  • Employment Scam — In this scam, job seekers are promised high-paying jobs in exchange for money and personal information, targeting them via email, leading to identity theft and financial losses.
  • Pretexting — It is the practice of obtaining a person's personal information using a fake name or fake company and then selling that information to people who use it to steal that person's online identity.

How can you safeguard your confidential information from getting hacked?

We can use the following measures to safeguard our confidential information from getting hacked:

  • Build strong passwords — It is important to create strong passwords for all our online accounts. A strong password should contain both uppercase and lowercase characters, as well as digits and punctuation. It should be atleast eight characters long.
  • Use multifactor authentication — Multifactor authentication is one of the simplest and the most effective ways to secure data, which adds an extra layer of protection.
  • Be suspicious of unsolicited e-mail — Be aware of nuisance ads and unsolicited e-mails from unknown sources. Try not to open any attachments that are along with such messages and do not reply to such messages.
  • Be Aware of Online Posting — One should never post any personal details or one's location online. Keep the mobile tracking or location tracking feature off, if possible.
  • Protect our mobile devices — Updating the mobile software on a regular basis will mitigate the risk of a cyber­ criminal exploiting a hole in mobile system.
  • Engage in safe web browsing — Do not open any link from unknown sources or any pop up that appears. Both could be spyware used to plant tracking cookies on our machine, which can steal our information, direct us to bogus phishing sites, and pound us with pop-ups.
  • Use safe sites to surf the internet — Always use the sites that start with https:\\ . The letter 's' specifies that it is a safe site to be browsed.
  • Use firewall — A firewall should be implemented to safeguard our computer system and data from any unauthorized external source.
  • Avoid using computers in public — Avoid using public computers to access private data like e-mails or sharing the private information like credit/debit card details.

What is the relevance of private browsing? Explain with the help of an example.

Private browsing is a means by which we can safeguard our identity and browsing details when online. By enabling incognito browsing mode in our web browsers, we can prevent:

  • Saving of our details as in the autofill feature
  • Accidental saving of username and passwords
  • Saving of browsing history when accessing the web from a public domain
  • Saving of data in cookies
  • Location tracking

For example, when we search for flights tickets or hotel rooms online, tracking cookies are generated through which websites remember our travel plans. If we don't do the booking in that browsing session, it can lead to higher prices when we return. In incognito mode, prices typically stay the same because the site can't track our previous visits.

Mention any two ways by which websites can track you.

Two ways by which websites can track us are as follows:

  • IP Address — Data transfer on a network happens through unique numerical addresses called IP addresses, similar to home or office addresses. When we visit a website, our device shares its IP address, allowing the website to roughly estimate our geographical location.
  • First Party Cookies — These kinds of cookies are generally used to store login id, password, autofill information etc. for the frequently visited websites.
  • Third Party Cookies — These are the cookies that websites store to get details of one's search history and web browsing history. These are most often used by advertising companies to track users across multiple websites that they visit.
  • Session Cookies — These are temporary cookies that are deleted after we close our browser.

Explain the term malware and its types. What precautions should be taken to prevent the entry of malware?

Malware is a malicious program that enters into a computer and damages it without the user's knowledge. It not only interrupts the normal working of a computer, but also steals important information of a user.

The different types of malware are:

  • Adware — Adware are programs that send unwanted advertisements to the user's computer. These advertisements generally appear in the form of pop ups, which can disrupt user's working.
  • Spyware — Spyware is malicious software that can collect various types of personal information, such as tracking the internet surfing habits and visiting web pages by the user or changing the configuration of our system.
  • Virus — A virus is a contagious program or code that attacks the user's system and causes damage to data and files on a system.
  • Worm — A worm is a program which can create multiple copies of itself and can consume large portion of system memory.
  • Trojan Horse — Trojan Horse is a program that at first glance seems to be useful but once it is activated, it harms the system by deleting files or by modifying useful information.
  • Denial-of-service attack — It is a harmful program meant to slow down a system. It can block a computer network and makes the software inaccessible to the user.
  • Rootkit — A malware designed to remotely control our system without being noticed. Once installed it will remotely access and modify sensitive system information without being tracked by any security program.
  • Backdoors — This software helps the other malware to enter our system and harm it.
  • Keyloggers — These are software designed to capture keystrokes without being identified by the user or security program.
  • Ransomware — It sends messages on a user's system that the system is locked and the user will not be able to work on it until one pays a certain amount.

Some precautions that should be taken to prevent the entry of malware are:

  • Security Programs — Reliable and updated anti-virus program should be installed on the computer. It should also be programmed to regularly scan and quarantine the system.
  • Secure Internet access — Only secure sites should be used for financial transactions avoiding sharing of personal information. Installation and download from unauthorised sources should be avoided.
  • Regular security updates — Always update your applications and OS and pay special attention to security patches and bulletins for each software.
  • Avoid Spams — Delete and avoid opening emails from unwanted or suspicious sources. Never download or open any attachments from such emails.
  • Backups — Regular backups are essential for data protection and integrity restoration.
  • Disable cookies, if possible — Cookies should be disabled on the browser to ensure safety of personal information.

Explain any four types of Cybercrimes.

Four types of Cyber crimes are:

  • Cyber stalking — It is a crime in which the attacker harasses a victim by using electronic communication, such as e-mail, instant messaging, or messages posted to a website or a discussion group for reason of anger, revenge, or control. A stalker may be an online stranger or a person whom the target knows.
  • Cyber bullying — It is an act of harming or harassing using information technology in a deliberate manner. This includes insulting remarks and threatening messages sent by e-mail, spreading rumours about the person either by e-mails or social networking sites, posting embarrassing photos and videos to hurt the person, derogatory remarks against gender, race, religion, or nationality.
  • Cyber espionage — It is the practice of using information technology to obtain secret information without permission from its owners or holders. Cyber espionage is most often used to gain strategic, economic, political, or military advantage, and is conducted using cracking techniques and malware.
  • Cyber Extortion — It is a crime that involves an attack coupled with a demand for money to stop further attacks. Cyber Extortion may involve a DoS (Denial of Service) attack or installation of Ransomware to access and block the system resources of the victim.

What is confidentiality of information? Mention any three practices to protect your confidential information.

Confidentiality of information means that only authorized users can access the personal and sensitive information of any person like their bank details, credit card numbers, aadhaar number, etc.

Three practices to protect our confidential information are as follows:

  • All our online accounts should be protected with strong passwords.
  • An extra layer of protection should be added to our online accounts through multi-factor authentication.
  • A firewall should be implemented to safeguard our computer system and data from any unauthorized external source.

Write a note on User Agent.

User agent refers to the software program such as our browser or a session initiating application. When we initiate a web session, these applications pass our information such as application type, operating system used, software source, version, etc. This information can be tracked and stored by web servers to determine the user's web activities and behaviour.

Write down the steps to protect your password from being hacked.

We should follow the following steps to protect our password from being hacked:

  • Make sure that the password is minimum eight characters long.
  • Use a combination of upper and lower-case letters. Include at least one numeric character and one special character.
  • Never use personal information like your name, birthday, driving license number or passport number.
  • Never store the password on computer or mobile phone.
  • When we are signing in to our account, deselect the auto selected option, "keep me signed in" or "remember me".
  • Clear browsing history or cache after online banking and shopping, so that no one can access it.
  • Always ensure that the site is genuine and secured before providing one's credentials.
  • Avoid using passwords like words spelt backwards, misspelt words, abbreviations, and single dictionary words that are easy to figure out.
  • Do not repeat numbers and letters. Do not include simple sequences or letters that appear in a row on the keyboard, instead use complex sequence.
  • Always create a unique password for each account. Avoid using the same password for multiple sites to prevent data loss.
  • The answers we provide for the security questions, should be as strong as our passwords.
  • Pay attention to the browser's security signals. If there is anything suspicious, we should refrain from using that resource.

Write down the ways to report a cyber-crime.

In case of any cyber crime, the matter should immediately be reported to either parents or school authorities.

  • Parents can visit a nearby police station and can lodge a complaint.
  • The Information Technology Act has global jurisdiction. It means that we can lodge a complaint against the crime from any state or city.
  • To know more about cyber law or to register a complaint, we can visit the following link: http://www.cybercrimehelpline.com/ .

Cyber Safety Class 9

This PowerPoint will help the not only the students but also others to learn about Cyber Safety, Software Piracy and their types and Computer Viruses and their types also. Read less

case study based questions on cyber safety class 9

Recommended

Cyber Crime and Security

More Related Content

What's hot.

Presentation on cyber safety

What's hot ( 20 )

Presentation on cyber safety

Similar to Cyber Safety Class 9

 cyber ethics

Similar to Cyber Safety Class 9 ( 20 )

 cyber ethics

More from NehaRohtagi1

Basics Of Computers | The Computer System

More from NehaRohtagi1 ( 20 )

Basics Of Computers | The Computer System

Recently uploaded

renewable energy renewable energy renewable energy  renewable energy

Recently uploaded ( 20 )

renewable energy renewable energy renewable energy  renewable energy

  • 1. CYBERSAFETY CLASS – 9
  • 2. WHAT IS CYBER CRIME ? ‘Cyber Crime’ can be defined as Criminal Activity involving information technology infrastructure, including illegal access and illegal interception of computer data to, from or within a computer system, Data Inference (damaging, deletion, altering computer data illegally), misuse of devices, Forgery (ID theft) and electronic fraud.
  • 3. TYPES OF CYBER CRIMES The following are the types of Cyber Crime:-  Theft Of Money  Theft Of Data  Fraud
  • 4. THEFT OF MONEY Commerce on Internet is mainly transacted through debit/credit cards. Therefore, thieves have been very active in obtaining stolen credit cards details to purchase goods and services over Internet. This type of Cyber Crime runs to millions of rupees per year.
  • 5. THEFT OF DATA Data and Information is the most Valuable Commodity any business has. The Cost of creating data from scratch can increase the cost of any hardware or programs. Data can be stolen by physical Theft of Hardware or through Unauthorized Access to the System.
  • 6. FRAUD ‘Fraud’ means trying to trick someone in order to gain an advantage. Some of these most common forms of computer frauds includes:-  Posing as someone from an Official Organization such as Bank or Electricity Board in order to get their Account Details.  Sending E – Mails to get Personal or Account Detail.  Stealing Identity of someone, to Steal their Money or some other criminal activity.
  • 7. REPORTING A CYBER CRIME On being the Victim of any Cyber Crime, the first step is to report the crime to the Law Enforcement Agency (Cyber Crime Branch or Police Station). Matters of Cyber Crime are investigated by Law Enforcement Agency (LEA) on registration of FIR. Further LEA approaches to Indian Computer Emerging Response Team (CERT – IN) for getting information related to technical analysis like details of E – Mails, SMS, Facebook, etc.
  • 8. UNETHICAL PRACTICES The common Unethical Practices on Internet are:-  Plagiarism  Cyber Bullying  Cyber Stalking  Hacking  Phishing  Spamming
  • 9. PLAGIARISM ‘Plagiarism’ deals with stealing of ideas and thoughts of other people on Internet and projecting them as one’s own work without permission of the original author. Preventing Plagiarism –  If you use ideas, texts, information from a website. Always acknowledge the website from where it is taken.  Seek written permission from the Author whose content you are using for your work.  You can also put the contents in quotes for avoiding Plagiarism.
  • 10. CYBER BULLYING ‘Cyber Bullying’ refers to the act of threating, humiliating, torturing or harassing someone on the Internet. This includes posting Negative Comments about someone and uploading unwanted photos and videos to hurt that person. This has become very common among teenagers. Preventing Cyber Bullying –  Never share your photos or videos publicly on Internet.  Keep your Password strong and never share them with others except your parents.  Think twice before posting anything on Internet.
  • 11. CYBER STALKING ‘Cyber Stalking’ refers to the act of harassing an individual over the Internet. Stalkers collect personal information such as name, contact details, social networking profile details, daily routine, house address, date of birth, etc., of a targeted person. Preventing Cyber Stalking –  Keep a Low Profile.  Maintain a good Social Hygiene.  Always hide your IP Address from strangers.  If you are being stalked on the Social Media, reset your Passwords.
  • 12. HACKING ‘Hacking’ means to gain the access on the Remote Computer to control it resources and information without any authorization from the Owner. The Intention behind the access of the system is to steal important data and corrupt it. Preventing Hacking –  Never use Pirated Software downloaded over Internet.  Always update your Antivirus Software in your System.  Never open an Unknown E – Mail message.  Change your Passwords frequently.
  • 13. PHISHING The fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers is called ‘Phishing’. Preventing Phishing –  Never provide any personal detail like Social Media Passwords, Bank Account Details, etc.  Never Access the Bank Website from the link provided in E – Mail.  Never respond or open an E – Mail from Unknown ID.
  • 14. SPAMMING Spamming’ refers to unwanted E – Mails sent in bulk to multiple users for promoting products or services. These types of E – Mails are sent forcefully to the people, who otherwise do not want to receive them. Preventing Spamming –  Never provide email address unnecessarily on any website.  Do not reply the E – Mails received in Spam Folders.
  • 15. SOFTWARE PIRACY ‘Software Piracy’ is the illegal copying, distributing, sharing, selling or use of software, whether intentional or not. The different types of Software Piracy are –  Counterfeiting – It means producing fake copies of a software, making it look authentic.  End-User Piracy – This occurs when an individual reproduces copies of software without authorization.  Internet Piracy – This occurs when software is downloaded from the Internet.  Soft lifting – It is when someone purchases one version of the software and downloads it onto multiple computers.
  • 16. COMPUTER VIRUS A ‘Computer Virus’ is a malicious piece of computer code designed to spread from device to device. Virus stands for ‘Vital Information Resources Under Siege’. Viruses spread when the software or documents are transferred using a network, a disk, file sharing methods, infected e- mail attachments. Some of the Computer Viruses are:-  Boot Sector Viruses  File Viruses  Trojan Horses  Macro Viruses  E – Mail Viruses Spyware Malware
  • 17. CYBER SECURITY ‘Cyber Security’ refers to the body of technologies, processes and practices designed to protect data, networks, information, devices and programs. It is important because Government, Military, Corporates, Financial and Medical Corporation collects, processes and store huge amount of data on computers and other devices.
  • 18. COMPUTER ETHICS The following Computer Ethics has to be remembered, while using Internet: -  Respect the Privacy of Others on Internet and never try to Access their personal information without their concern.  Never use the information which is protected by the Copyrights.  Do not post negative information on the Internet because it can harm many people.  Always use Original Software.  Never use technology to keep an eye on other’s system.  Be respectful to others while Communicating on the Internet.
  • 19. RIGHT TO PRIVACY ‘Privacy’ is one of the Individual’s right to keep his/her Personal Information secret from others an reveal it to only the Selective Ones. Accessing one’s personal data without his/her consent is Unethical and Illegal. Protecting Privacy –  Never share your Account Details like Login ID or Passwords with others.  Cookies stored in your system from different websites can cause leakage of information.  Avoid of keeping Confidential Details in your System, if not required.
  • 20. IT ACT 2000 The Information Technology Act 2000, of the Indian Parliament notified on 17th October 2000. It is the primary law in India dealing with cybercrime and electronic commerce. The Act provides a legal framework for electronic governance by giving recognition to electronic records and digital signatures. It also defines cyber crimes and prescribes penalties for them. The Act directed the formation of a Controller of Certifying Authorities to regulate the issuance of digital signatures. It also established a Cyber Appellate Tribunal to resolve disputes rising from this new law.
  • 21. INTELLECTUAL PROPERTY RIGHT ‘Intellectual Property Rights’ (IPRs) are legal rights that protect creations and/or inventions resulting from intellectual activity in the industrial, scientific, literary or artistic fields. The most common IPRs include patents, copyrights, marks and trade secrets. The acts which are regarded to IPRs are –  Copyright Act  Industrial Property Rights  Patent  Trademark
  • 22. GENERAL NETIQUETTES ‘Netiquette’ is a combination of the words Network and Etiquette and is defined as a set of rules for acceptable online behavior. Some of the General Netiquettes are:-  Obey Copyright Laws – While copying text or pictures, obey copyright laws. Don’t steal.  Be Aware of Cyberbullying – If you are targeted by cyberbullying do not respond. Keep all the records, with dates and time if possible. Talk to your parents about the Issue.  Respect Others – Do not post any abusive words about any person on the Internet.  Be Tolerant and Careful – Be open to understand the point of views of others on the Internet. Don’t jump into conclusions.
  • 23. SOCIAL NETWORKING NETIQUETTES ‘Social Networking’ is the use of Internet-based social media sites to stay connected with friends, family, colleagues, customers, or clients. Some of the basic Social Networking Netiquettes are:-  Screen Name – When creating your screen name, do not include your personal information.  Password – Do not share your passwords with anyone except your parents.  Personal Information – Don’t give your personal information to anyone on the Internet without your parents permission.  Online Friends – Do not agree to meet your any online friend without the consent of your parents.
  • 24. E – MAIL NETTIQUETTES Some of the basic E – Mail Netiquettes are:-  Do Not Shout – Don’t capitalize all your letters, no matter how urgent your email is, as you will look aggressive – it’s like shouting over email.  Pay Attention to Spellings – Grammar, spelling and punctuation should be one of the top concerns in writing emails.  Think Before You Speak – Never use offensive language in your E – Mails.  Take a Look Before Sending a Message – Always remember to go through the E – Mail before sending it.
  • 25. SAFETY MEASURES WHILE USING INTERNET The Safety Measures which you have to keep in mind, while using Internet:-  Don’t share your personal information.  Double-check any links before you click.  Use secure public Wi-Fi networks.  Use a VPN with your Wi-Fi connection.  Only log into sites that start with “https://”.  Use antivirus and antimalware software.  Create and use complex passwords.
  • 26. HOW TO PROTECT COMPUTER ?  STEP 1 Use Updated Antivirus Software: Antivirus is a kind of software used to prevent, scan, detect and delete viruses from a computer.  Advantages- Protection from viruses and their transmission, Block spam and ads, Defense against hackers and data thieves, etc.  STEP 2 – Keep Your Firewall Turned On: A Firewall is a network security device that monitors incoming and outgoing network traffic.  STEP 3 – Keep the Operating System Updated: Software Updates are important because they often include critical patches to security holes.

Self Studies

  • Andhra Pradesh
  • Chhattisgarh
  • West Bengal
  • Madhya Pradesh
  • Maharashtra
  • Jammu & Kashmir
  • NCERT Books 2022-23
  • NCERT Solutions
  • NCERT Notes
  • NCERT Exemplar Books
  • NCERT Exemplar Solution
  • States UT Book
  • School Kits & Lab Manual
  • NCERT Books 2021-22
  • NCERT Books 2020-21
  • NCERT Book 2019-2020
  • NCERT Book 2015-2016
  • RD Sharma Solution
  • TS Grewal Solution
  • DK Goel Solution
  • TR Jain Solution
  • Selina Solution
  • Frank Solution
  • ML Aggarwal Solution
  • Lakhmir Singh and Manjit Kaur Solution
  • I.E.Irodov solutions
  • ICSE - Goyal Brothers Park
  • ICSE - Dorothy M. Noronhe
  • Sandeep Garg Textbook Solution
  • Micheal Vaz Solution
  • S.S. Krotov Solution
  • Evergreen Science
  • KC Sinha Solution
  • ICSE - ISC Jayanti Sengupta, Oxford
  • ICSE Focus on History
  • ICSE GeoGraphy Voyage
  • ICSE Hindi Solution
  • ICSE Treasure Trove Solution
  • Thomas & Finney Solution
  • SL Loney Solution
  • SB Mathur Solution
  • P Bahadur Solution
  • Narendra Awasthi Solution
  • MS Chauhan Solution
  • LA Sena Solution
  • Integral Calculus Amit Agarwal Solution
  • IA Maron Solution
  • Hall & Knight Solution
  • Errorless Solution
  • Pradeep's KL Gogia Solution
  • OP Tandon Solutions
  • Sample Papers
  • Previous Year Question Paper
  • Value Based Questions
  • CBSE Syllabus
  • CBSE MCQs PDF
  • Assertion & Reason
  • New Revision Notes
  • Revision Notes
  • HOTS Question
  • Marks Wise Question
  • Toppers Answer Sheets
  • Exam Paper Aalysis
  • Concept Map
  • CBSE Text Book
  • Additional Practice Questions
  • Vocational Book
  • CBSE - Concept
  • KVS NCERT CBSE Worksheets
  • Formula Class Wise
  • Formula Chapter Wise
  • JEE Crash Course
  • JEE Previous Year Paper
  • Important Info
  • JEE Mock Test
  • SRM-JEEE Mock Test
  • VITEEE Mock Test
  • BITSAT Mock Test
  • Manipal Engineering Mock Test
  • AP EAMCET Previous Year Paper
  • COMEDK Previous Year Paper
  • GUJCET Previous Year Paper
  • KCET Previous Year Paper
  • KEAM Previous Year Paper
  • Manipal Previous Year Paper
  • MHT CET Previous Year Paper
  • WBJEE Previous Year Paper
  • AMU Previous Year Paper
  • TS EAMCET Previous Year Paper
  • SRM-JEEE Previous Year Paper
  • VITEEE Previous Year Paper
  • BITSAT Previous Year Paper
  • Crash Course
  • Previous Year Paper
  • NCERT Based Short Notes
  • NCERT Based Tests
  • Previous Year Papers
  • Quantitative Aptitude
  • Numerical Aptitude Data Interpretation
  • General Knowledge
  • Mathematics
  • Agriculture
  • Accountancy
  • Business Studies
  • Political science
  • Enviromental Studies
  • Mass Media Communication
  • Teaching Aptitude
  • NAVODAYA VIDYALAYA
  • SAINIK SCHOOL (AISSEE)
  • Mechanical Engineering
  • Electrical Engineering
  • Electronics & Communication Engineering
  • Civil Engineering
  • Computer Science Engineering
  • CBSE Board News
  • Scholarship Olympiad
  • School Admissions
  • Entrance Exams
  • All Board Updates
  • Miscellaneous
  • State Wise Books
  • Engineering Exam

NCERT Book for Class 9th Information and Communication Technology Chapter 7 Safety Security in the Cyber World

Ncert books for class 9th information and communication technology chapter 7 safety security in the cyber world download pdfs.

NCERT Books For Class 9th Information and Communication Technology Chapter 7 Safety Security in the Cyber World students are the must-have book. Class 9th is an essential class for every single student. This class is the first step towards the advanced level of the study. Often it is considered that students should give more attention to the class 9th. Because class 9th is the foundation of class 11th. Also, a student from class 9th gets to introduce lots of different and advanced topics. Like Motion in physics, coordinate geometry in Maths etc. To have a good understanding of these topics students should refer to the NCERT Book for their study. The Ncert book has covered all these topics in details to give students comprehensive information. Also, CBSE follows the NCERT book to teach its students. This book has distributed every single topic and chapter in a systematic manner. So that students don’t get confused with the topics.

NCERT books for Class 9th are available for almost necessary subject such as Information and Communication Technology Chapter 7 Safety Security in the Cyber World. You can download all of them from here.

Mostly class 9th Physics and Maths grab more attention from the students. If we observe the chapters in physics then we will find that this book has an enormous amount of concepts that have real-life examples and we can relate to that as well.  

Where to download all the class 9th NCERT Book?

To download all the Information and Communication Technology Chapter 7 Safety Security in the Cyber World class 9th NCERT Book PDF. You can refer to the given list to download the book for each subject according to your need. 

9th class books pdf download

  • NCERT Book Class 9 Maths
  • NCERT Book Class 9 Science

Why is the NCERT book good?

NCERT Book is really good for the students. Because this book has elaborated the concepts in a very systematic manner along with real-world examples. Such as “There is a use of Friction, while we ride a bike or cycle.” NCERT Class 9 Information and Communication Technology Chapter 7 Safety Security in the Cyber World textbook has written in an easy to understand language. Which makes it a more preferred book for all the class 9th students. There is one more interesting fact about the NCERT Book that is, You can easily download the NCERT Book Solutions for class 9th. This book will help you to solve the answer to a question if you are stuck somewhere in the question. All solutions have followed the proper steps. Which makes students learn faster and easier. 

It is very good about the NCERT Book that it has an enormous amount of sample question papers for every single chapter. Which helps students to practice the various concepts so that they can understand the topics much easier.

How to make class 9th easy?

To make class 9th a bit easy. You can prefer Class 9th solutions to find out the solution of any question if you are stuck at. Also, students can prefer NCERT Class 9th sample papers. By which students can do lots of practice of the questions or physic’s numerical. Students should give more attention to the topics and chapters they are studying.

What are the benefits of NCERT Books for class 9th?

The benefits of NCERT Books are in a number of ways. Let’s check all of them

  • NCERT books are easy to understand. 
  • This book comes in different languages. Students can use it as per their preferences.
  • It has different types of questions which makes the study a bit interesting.
  • CBSE school prefers to use NCERT books. Meaning questions in the examination can be asked from the NCERT books.
  • Free available online. Download here. But, If you want to buy it then you can have it at a very low price in your nearest stationary shop.

Often we buy things after knowing their features and usability. So let’s see 

What are the features which make NCERT Book best for students?

Features of NCERT Books that make it best for the students are as follows:

  • Easy to read sentences/words.
  • Availability. Download here
  • It follows the latest syllabus. 
  • Books are recommended by lots of State board and CBSE school or Board.
  • Pictorial presentation of the relevant topics or concepts.

Manipal MET 2024 Application (Released) (All Pages)

  • NCERT Solutions for Class 12 Maths
  • NCERT Solutions for Class 10 Maths
  • CBSE Syllabus 2023-24
  • Social Media Channels
  • Login Customize Your Notification Preferences

case study based questions on cyber safety class 9

One Last Step...

case study based questions on cyber safety class 9

  • Second click on the toggle icon

case study based questions on cyber safety class 9

Provide prime members with unlimited access to all study materials in PDF format.

Allow prime members to attempt MCQ tests multiple times to enhance their learning and understanding.

Provide prime users with access to exclusive PDF study materials that are not available to regular users.

case study based questions on cyber safety class 9

devlibrary.in

Class 9 Computer Science Chapter 11 Case Studies Applications of it in Daily Use

Class 9 Computer Science Chapter 11 Case Studies Applications of it in Daily Use Question Answer, Computer Science Class 9 Solutions, NCERT Class 9 Computer Science Chapter 11 Case Studies Applications of it in Daily Use Question Answer for each chapter is provided in the list so that you can easily browse throughout different chapters  SCERT Class 9 Computer Science Chapter 11 Case Studies Applications of it in Daily UseSolutions and select needs one.

Also, you can read the SCERT book online in these sections Solutions by Expert Teachers as per SCERT ( CBSE ) Book guidelines. NCERT Solution of Class 9 Computer Science Chapter 11 Case Studies Applications of it in Daily Use  is part of AHSEC  All Subject Solutions . Here we have given Class 9 Computer Science Chapter 11th Case Studies Applications of it in Daily Use Notes for All Subjects, You can practice these here in SEBA Class 9 Computer Science.

Case Studies Applications of it in Daily Use

Chapter – 11

COMPUTER SCIENCE

1. DISCUSSION OF DIFFERENT CAREER OPTIONS AND OPPORTUNITIES IN INFORMATION TECHNOLOGY.

There are various IT career options, You can choose. 

Below is the list of careers in IT along with their job profile.

1. Support Specialist: They provide technical support to organizations by managing, maintaining, and troubleshooting their IT systems and communicating with co-workers to diagnose problems. They prioritize a workload to ensure the most critical issues are resolved first and document standard support procedures that co-workers may follow.

2. Computer Programmer: Computer programmers write, modify, and test code and scripts that allow computer software and applications to function properly. They turn the designs created by software developers and engineers into instructions that a computer can follow.

3. Web Developer: Web developers design and build websites. They are typically responsible for the appearance, of the site and technical aspects, such as site speed and how much traffic the site can handle. Web developers may also create site content that requires technical features.

4. IT Technician: An IT Technician is a professional who is responsible for installing, maintaining, and repairing hardware & software components of the organization’s computers. They also support these systems through remote access or site visits as needed by management teams within their company.

5. System Analyst: Evaluating current IT systems, including hardware, software, and network features. Communicating with management and employees to determine system requirements. Planning new systems that address any issues with the current systems.

6. Network Engineer: A Network Engineer job description can therefore comprise of Designing and implementing new network solutions and/or improving the efficiency of current networks. Installing, configuring, and supporting network equipment including routers, proxy servers, switches, WAN accelerators, DNS, and DHCP.

7. Database Administrator: Database Administrators ensure that the databases run efficiently and securely. For example, they create or organize systems to store different data types, such as financial information and customer shipping records. They also make sure authorized users can access this information when needed.

8. Web Administrator: Web administrators design, develop, maintain and troubleshoot websites. Most importantly, they ensure a safe and efficient user experience. This may include implementing security protocols, modifying programs, creating backups, resolving software problems, updating content and more.

9. IT Coordinator: The IT Coordinator is a professional responsible for maintaining and managing information technology systems and networks within an organization. They ensure the functionality and efficiency of computer and telecom systems by establishing protocols, providing technical support, and advising on IT choices.

10. Data Entry Operator: Prepares, compiles, and sorts documents for data entry. Verifies and logs receipt of data. Transcribe source data into the required electronic format. Transfers information from paper formats into computer files using keyboards, data recorders, or optical scanners.

11. Data Scientist: A Data Scientist is a proficient specialist who applies mathematical, problem-solving, and coding skills to manage big data, extracting valuable insights. They design tailor-made solutions from this data, aiding organizations in achieving their unique objectives and goals.

12. Software engineering: A Software Engineer is an IT professional who designs, develops, and maintains computer software at a company. They use their creativity and technical skills and apply the principles of software engineering to help solve new and ongoing problems for an organization.

13. Data Analyst: Interpreting data, and analyzing results using statistical techniques. Developing and implementing data analyses, data collection systems, and other strategies that optimize statistical efficiency and quality.

14. Computer Repair Technician: Maintaining hardware and software by conducting regular maintenance and updates. Identifying and resolving network, connectivity, and server issues. Upgrading firmware, software, and outdated hardware systems. Monitoring and maintaining security systems and installing updates.

15. Product Management: The Product Manager is responsible for product planning, delivery, and marketing throughout the product lifecycle. They will develop a vision and roadmap for the product based on input from internal stakeholders, customers, market research, and their own industry insight.

2. MAKING YOUR BIODATA IN MS-WORD

For writing biodata, Dev has to use word processing software like MS Word, Libre Writer, etc.

Dev has to keep the following points for writing the biodata:

  • Choose the right software to create the biodata.
  • Add a header.
  • Write the title.
  • State your objective.
  • Add your work experience.
  • Mention your educational qualifications.
  • Add your key skills and certificates.
  • Note your hobbies and interests.

A sample of a biodata has been given below so that Dev can follow.

case study based questions on cyber safety class 9

3. CREATING A BROCHURE FOR YOUR SCHOOL IN MS-WORD.

A sample of a brochure is given below:

case study based questions on cyber safety class 9

4. CREATING REPORT CARD IN MS EXCEL.

A sample of the report card is shown below:

case study based questions on cyber safety class 9

5. CREATING A PRESENTATION IN MS- POWERPOINT WITH BIOGRAPHY OF GREAT PERSONALITIES OF INDIA.

Sample of the presentation in Microsoft PowerPoint.

case study based questions on cyber safety class 9

Hi, I’m Dev Kirtonia, Founder & CEO of Dev Library. A website that provides all SCERT, NCERT 3 to 12, and BA, B.com, B.Sc, and Computer Science with Post Graduate Notes & Suggestions, Novel, eBooks, Biography, Quotes, Study Materials, and more.

Related Posts

Class 9 Computer Science Question Answer

Class 9 Computer Science Chapter 1 Basics of Computer System

Class 9 Computer Science Chapter 1 Basics of Computer System Question Answer, SEBA Class 9 Computer Science Solutions, NCERT Class 9 Computer Science Chapter 1…

Read More »

Class 9 Computer Science Chapter 2 Operating System and Its Importance

Class 9 Computer Science Chapter 2 Operating System and Its Importance Question Answer, SEBA Class 9 Computer Science Solutions, NCERT Class 9 Computer Science Chapter…

Class 9 Computer Science Chapter 3 Office Application

Class 9 Computer Science Chapter 3 Office Application Question Answer, SEBA Class 9 Computer Science Solutions, NCERT Class 9 Computer Science Chapter 3 Office Application…

Leave a Comment Cancel Reply

Your email address will not be published. Required fields are marked *

Chapter 7 Safety and Security in the Cyber World Class 9

NCERT Book for Class 9 Information and Communication Technology Chapter 7 Safety and Security in the Cyber World is accessible for persuing/read or download on this page. The situations where you don’t access to its physical copy, its pdf format will help you there. After the jpg format of chapter you will find a link from where you can download it in pdf format for your future reference and for sharing it with your students, friends, and teachers.

You will also get links to Class 9, Information and Communication Technology Chapterwise Notes, Important Questions of all Chapters , Sample Papers, Previous Year Papers, Practice Papers, etc.

COMPLETE TEXTBOOK

CLICK HERE TO DOWNLOAD THE PDF OF CLASS 9, Information and Communication Technology, Chapter 7 Safety and Security in the Cyber World.

NCERT SOLUTIONS FOR CLASS IX Information and Communication Technology

If you want Stepwise SOLUTIONS of  Chapter 7 Safety and Security in the Cyber World, then CLICK HERE to directly go on page from where you will find Solutions of each and every question of this chapter done by Subject Experts and Experienced Teachers.

You can also CLICK HERE to land on the page, where you’ll find Chapterwise all solutions of Complete NCERT Book of Information and Communication Technology of Class IX.

Want to Buy NCERT Information and Communication Technology

We Understand the value of your time, that’s why for your convenience & saving your time we have generated direct link to NCERT Book Class 9 Information and Communication Technology, so that you need not keep the search for it on different platforms. You can simply visit the link to go to the World’s No -1 trusted website-  Amazon and order online.

CLICK HERE   TO GO AMAZON WEBSITE TO BUY  NCERT – Information and Communication Technology, BOOKS OF CLASS IX, ONLINE.

IndCareer Logo Small 200

IndCareer Schools

School Admissions & Notices

NCERT Book for Class 9 Information and Communication Technology Chapter 7 Safety and Security in the Cyber World

case study based questions on cyber safety class 9

Share this:

  • Click to share on Twitter (Opens in new window)
  • Click to share on Facebook (Opens in new window)
  • Click to share on LinkedIn (Opens in new window)
  • Click to share on WhatsApp (Opens in new window)
  • Click to share on Telegram (Opens in new window)

NCERT Book for Class 9 Information and Communication Technology Chapter 7 Safety and Security in the Cyber World

Class 9 Information and Communication Technology Chapter 7 Safety and Security in the Cyber World: NCERT Book for Class 9 Information and Communication Technology Chapter 7 Safety and Security in the Cyber World is available for reading or download on this page. Students who are in Class 9 or preparing for any exam which is based on Class 9 Information and Communication Technology can refer NCERT Book for their preparation. Class 9th Information and Communication Technology NCERT Books PDF Provided will help you during your preparation for both school exams as well as competitive exams.

Here you can read Chapter 7 of Class 9 Information and Communication Technology NCERT Book.

NCERT Class 9th Information and Communication Technology Chapter 7 Books will give you authentic information and you can rely on them during your preparation. Try practicing the previous papers and sample questions attached in the NCERT Books of Class 9th Information and Communication Technology Chapter 7 Safety and Security in the Cyber World to solve the questions in your exam easily.

Scroll down for Safety and Security in the Cyber World from NCERT Book Class 9 Information and Communication Technology Book & important study material.

  • 1 NCERT Book for Class 9 Information and Communication Technology Chapter 7 Safety and Security in the Cyber World
  • 2 Download NCERT Book for Class 9 Information and Communication Technology PDF
  • 3 Buy NCERT Book for Class 9 Information and Communication Technology Online
  • 4 NCERT Solutions for Class 9 Chapter 7 Safety and Security in the Cyber World
  • 5.1 Related

NCERT Book for Class 9 Information and Communication Technology Chapter 7 Safety and Security in the Cyber World - Page 1

Download NCERT Book for Class 9 Information and Communication Technology PDF

NCERT books can be downloaded in PDF format from the official website.

Click Here  to go to the page where you can download NCERT Information and Communication Technology Book Class 9 PDF.

Buy NCERT Book for Class 9 Information and Communication Technology Online

You can buy the Class 9 Information and Communication Technology NCERT Book from various online platforms. For your convenience, we have curated a direct link to NCERT Book Class 9 Sanskrit. You can simply visit the link to go to the amazon website and order online.

Click Here to go to the Amazon website to buy NCERT Book Class 9 Information and Communication Technology Online.

NCERT Solutions for Class 9 Chapter 7 Safety and Security in the Cyber World

After reading the chapter, you can refer to our Class 9 NCERT Solutions . Step by Step answers to all the exercise questions is provided by experts to help you prepare better in your examination.

  • Get NCERT Solutions for Class 9 Information and Communication Technology Chapter 7 Safety and Security in the Cyber World
  • Get NCERT Solutions for Class 9 Information and Communication Technology

All the study material was prepared to help you understand the topic easily and better way. If you like our resources, please share the post!

You can download NCERT Books for 9th Class Information and Communication Technology Chapter 7 Safety and Security in the Cyber World PDF free of cost on our page.

Short Answer Type Questions: Cyber Safety | Computer Science for Grade 9 PDF Download

Q1. Name the three type of information collected by a social networking site.

Ans: T he three type of information collected by a social networking site are

  • Required Information:  Name, E-Mail, Date of Birth, Location. (Essential for the account.)
  • Secret Information:  Alternate e-mail, mobile phone number, security question and answer. (In case the account is compromised or you have lost your password.)
  • Biographical Information:  Information about yourself submitted voluntarily. (For advertisement content offered to you and to aid in advertisement targeting.) .

Q2. What is Pharming?

Ans:  Pharming refers to the fraudulent practice of directing Internet users to a bogus website that mimics the appearance of a legitimate one, in order to obtain personal information such as passwords, account numbers, etc.

Q3. What is Cyberstalking?

Ans:  Cyberstalking is a crime in which the attacker harasses a victim using electronic communication, such as e-mail or instant messaging (IM), or messages posted to a social networking site and chat site. A cyberstalker, using anonymity allow them to stalk their victim without being detected.

Q4. State two methods by which you can detect a virus.

Ans:  Following are some of the ways your computer reacts to viruses:

  • The speed of your computer may go down to a considerable extent.
  • Certain software may require more time to start than it does usually.
  • Certain software may not start at all.
  • Some software may start normally but closes down abruptly.

Q5. State three points that you should remember while selecting a password.

Ans:  While selecting passwords the following points are to be remembered:

  • The longer the password, the harder it is to crack. Consider a 12-character password or longer.
  • Avoid names, places, and dictionary words.
  • Mix it up. Use variations on capitalization, spelling, numbers, and punctuation.
  • You may also use a specialized Password Manager package; as ultimately the number of passwords that you need to remember will grow.

Q6. List two methods by which you will be able to identify malicious websites.

Ans:  The following are the list of malicious, criminal or inappropriate websites:

  • Check for presence of an address, phone number and/or email contact – often indications that the website is genuine. If in doubt, send an email or call to establish authenticity.
  • Check that the website’s address seems to be genuine by looking for subtle misspellings, extra words, characters or numbers or a completely different name from that you would expect the business to have.
  • Roll your mouse pointer over a link to reveal its true destination, displayed in the bottom left corner of your browser. Beware if this is different from what is displayed in the text of the link from either another website or an email.

Top Courses for Grade 9

Faqs on short answer type questions: cyber safety - computer science for grade 9, short answer type questions: cyber safety | computer science for grade 9, shortcuts and tricks, extra questions, sample paper, important questions, objective type questions, practice quizzes, study material, past year papers, semester notes, video lectures, mock tests for examination, previous year questions with solutions, viva questions.

case study based questions on cyber safety class 9

Short Answer Type Questions: Cyber Safety Free PDF Download

Importance of short answer type questions: cyber safety, short answer type questions: cyber safety notes, short answer type questions: cyber safety grade 9, study short answer type questions: cyber safety on the app, welcome back, create you account for free.

case study based questions on cyber safety class 9

Forgot Password

Unattempted tests, change country.

cbse cs logo

Class 9 Computer Applications

Join online personal class, techno class youtube channel, computer application class 9 syllabus, topic : class 9 computer applications, answers of ratna sagar book.

case study based questions on cyber safety class 9

  • Introduction to computer system
  • Computer Components
  • Computer Software
  • Operating System
  • Communication Technologies
  • Cyber Safety
  • Open Office Writer
  • OPen Office Calc
  • Open Office Impress

Simply Coding

Computer Networks

Computer networking: case study questions.

  • Categories Computer Networks , Networking , Computer Networks

case study based questions on cyber safety class 9

This post contains case study questions on Computer Networking.

Case study 1:.

Web server is a special computer system running on HTTP through web pages. The web page is a medium to carry data from one computer system to another. The working of the webserver starts from the client or user. The client sends their request through the web browser to the webserver. Web server takes this request, processes it and then sends back processed data to the client. The server gathers all of our web page information and sends it to the user, which we see on our computer system in the form of a web page. When the client sends a request for processing to the web server, a domain name and IP address are important to the webserver. The domain name and IP address are used to identify the user on a large network.

  • IP addresses
  • Computer systems
  • Webpages of a site
  • A medium to carry data from one computer to another
  • Home address
  • Domain name
  • Both b and c
  • Hypertext Transfer Protocol
  • Hypertext Transfer Procedure
  • Hyperlink Transfer Protocol
  • Hyperlink Transfer Procedure
  • Domain name system
  • Routing information protocol
  • Network time protocol
  • None of the above
  • Domain Name Security
  • Domain Number System
  • Document Name System
  • Domain Name System

Case Study 2:

In mid 80’s another federal agency, the NSF created a new high capacity network called NSFnet, which was more capable than ARPANET. The only drawback of NSFnet was that it allowed only academic research on its network and not any kind of private business on it. Now, several private organisations and people started working to build their own networks, named private networks, which were later (in 1990’s) connected with ARPANET and NSFnet to form the Internet. The Internet really became popular in 1990’s after the development of World Wide Web.

  • National Senior Foundation Network
  • National Science Framework Network
  • National Science Foundation Network
  • National Science Formation Network
  • Advanced Research Premium Agency NETwork
  • Advanced Research Projects Agency NETwork
  • Advanced Review Projects Agency NETwork
  • Advanced Research Protection Agency NETwork
  • A single network
  • A vast collection of different networks
  • Interconnection of local area networks
  • Interconnection of wide area networks
  • Internet architecture board
  • Internet society
  • Internet service provider
  • Different computer
  • Leased line
  • Digital subscriber line
  • Digital signal line
  • Digital leased line

Case Study 3:

TCP/IP, or the Transmission Control Protocol/Internet Protocol, is a suite of communication protocols used to interconnect network devices on the internet. TCP/IP can also be used as a communications protocol in a private computer network (an intranet or an extranet).

TCP defines how applications can create channels of communication across a network. It also manages how a message is assembled into smaller packets before they are then transmitted over the internet and reassembled in the right order at the destination address.

IP defines how to address and route each packet to make sure it reaches the right destination. Each gateway computer on the network checks this IP address to determine where to forward the message. TCP/IP uses the client-server model of communication in which a user or machine (a client) is provided a service (like sending a webpage) by another computer (a server) in the network. Collectively, the TCP/IP suite of protocols is classified as stateless, which means each client request is considered new because it is unrelated to previous requests. Being stateless frees up network paths so they can be used continuously.

  • All of the above
  • Remote procedure call
  • Internet relay chat
  • Resource reservation protocol
  • Local procedure call
  • communication between computers on a network
  • metropolitan communication
  • sesson layer
  • transport layer
  • network layer
  • data link layer

Case Study 4:

A blog is a publication of personal views, thoughts, and experience on web links. It is a kind of personal diary note about an individual. The contents published on a blog are organized in a reverse manner, it means recent posts appear first and the older posts are further downwards.

Blogger – a person who posts a blog in the form of text, audio, video, weblinks, etc is known as a blogger. Bloggers have followers who follow them to get instant messages post by the blogger.

In most cases, celebrities, business tycoons, famous politicians, social workers, speakers, etc are the successful blogger because people follow them to know about their success stories and ideas.

  • social networking
  • social networking sites
  • e-commerce websites
  • search engines
  • entertainment sites
  • social network
  • entertainment
  • search engine
  • none of these

Which of the following is an example of micro-blogging?

Which of the following is not used as blogging platform?

  • discussion boards

Case Study 5:

An email is a service of sending or receiving emails or messages in the form of text, audio, video, etc over the internet. Various service providers are providing email services to users. The most popular service providers in India are Gmail, Yahoo, Hotmail, Rediff, etc.

An email address for an email account is a unique ID. This email ID is used to send and receive mails over the Internet. Each email address has two primary components: username and domain name. The username comes first, followed by the @) symbol and then the domain name.

  • none of the above

Which of the following is the correct format of email address?

  • name@website@info
  • [email protected]
  • www.nameofwebsite.com
  • name.website.com
  • multipurpose internet mail extensions
  • multipurpose internet mail email
  • multipurpose internet mail end
  • multipurpose internet mail extra
  • mail server
  • user agents

NVT stands for

  • network virtual transmission
  • network virtual test
  • network virtual terminal
  • network virtual tell

Case study 6:

In 1989, Tim Berners Lee, a researcher, proposed the idea of World Wide Web). Tim Berners Lee and his team are credited with inventing Hyper Text Transfer Protocol (HTTP), HTML and the technology for a web server and a web browser. Using hyperlinks embedded in hypertext the web developers were able to connect web pages. They could design attractive webpages containing text, sound and graphics. This change witnessed a massive expansion of the Internet in the 1990s.

  • A program that can display a webpage
  • A program used to view HTML documents
  • It enables a user to access the resources of internet
  • a) is same every time whenever it displays
  • b) generates on demand by a program or a request from browser
  • c) both is same every time whenever it displays and generates on demand by a program or a request from browser
  • d) is different always in a predefined order
  • a) unique reference label
  • b) uniform reference label
  • c) uniform resource locator
  • d) unique resource locator
  • a) asynchronous javascript and xml
  • b) advanced JSP and xml
  • c) asynchronous JSP and xml
  • d) advanced javascript and xml
  • a) convention for representing and interacting with objects in html documents
  • b) application programming interface
  • c) hierarchy of objects in ASP.NET
  • d) scripting language
  • a) VBScript
  • a) sent from a website and stored in user’s web browser while a user is browsing a website
  • b) sent from user and stored in the server while a user is browsing a website
  • c) sent from root server to all servers
  • d) sent from the root server to other root servers

Case study 7:

E-business, commonly known as electronic or online business is a business where an online transaction takes place. In this transaction process, the buyer and the seller do not engage personally, but the sale happens through the internet. In 1996, Intel’s marketing and internet team coined the term “E-business

E-Commerce stands for electronic commerce and is a process through which an individual can buy, sell, deal, order and pay for the products and services over the internet. In this kind of transaction, the seller does not have to face the buyer to communicate. Few examples of e-commerce are online shopping, online ticket booking, online banking, social networking, etc.

  • doing business
  • sale of goods
  • doing business electronically
  • all of the above

Which of the following is not a major type of e-commerce?

  • consolidation
  • preservation
  • reinvention

The primary source of financing during the early years of e-commerce was _______

  • large retail films
  • venture capital funds
  • initial public offerings
  • small products
  • digital products
  • specialty products
  • fresh products
  • value proposition
  • competitive advantage
  • market strategy
  • universal standards

Case study 8:

Due to the rapid rise of the internet and digitization, Governments all over the world are initiating steps to involve IT in all governmental processes. This is the concept of e-government. This is to ensure that the Govt. administration becomes a swifter and more transparent process. It also helps saves huge costs.

E-Group is a feature provided by many social network services which helps you create, post, comment to and read from their “own interest” and “niche-specific forums”, often over a virtual network. “Groups” create a smaller network within a larger network and the users of the social network services can create, join, leave and report groups accordingly. “Groups” are maintained by “owners, moderators, or managers”, who can edit posts to “discussion threads” and “regulate member behavior” within the group.

  • can be defined as the “application of e-commerce technologies to government and public services .”
  • is the same as internet governance
  • can be defined as “increasing the participation in internet use by socially excluded groups”
  • Individuals in society
  • computer networks
  • Tax Deduction Account Number
  • Tax Deduction and Collection Account Number
  • Taxable Account Number
  • Tax Account Number
  • who conduct seminars
  • who get together on weekends
  • who have regular video conferences
  • having the ability to access and contribute to forum topics

Case study 9:

Coursera has partnered with museums, universities, and other institutions to offer students free classes on an astounding variety of topics. Students can browse the list of available topics or simply answer the question “What would you like to learn about?”, then when they answer that question they are led to a list of available courses on that topic. Students who are nervous about getting in over their heads can relax.

  • Mobile Online Open Courses
  • Massive Online Open Courses
  • Mobile Open Online Courses
  • Massive Open Online Courses
  • Blended learning
  • Distance learning
  • Synchronous learning
  • Asynchronous learning
  • Induction to the company for new employees
  • Microsoft excel training
  • Team-building exercise
  • Building your assertiveness skills at work
  • Learners using technology in a classroom environment lead by a tutor
  • Training course done by youtube tutorials
  • An online learning environment accessed through the internet (i.e. webinars)
  • An online learning course
  • MasterClass
  • SimplyCoding

Case study 10:

Search Engines allow us to filter the tons of information available on the internet and get the most accurate results. And while most people don’t pay too much attention to search engines, they immensely contribute to the accuracy of results and the experience you enjoy while scouring through the internet.

Besides being the most popular search engine covering over 90% of the worldwide market, Google boasts outstanding features that make it the best search engine in the market. It boasts cutting-edge algorithms, easy-to-use interface, and personalized user experience. The platform is renowned for continually  updating its search engine  results and features to give users the best experience.

  • Software systems that are designed to search for information on the world wide web 
  • Used to search documents
  • Used to search videos
  • Single word
  • Search engine pages
  • Search engine result pages
  • Web crawler
  • Web indexer
  • Web organizer
  • Web manager
  • Ink directory
  • Search optimizer
  • Generating cached files
  • Affecting the visibility
  • Getting meta tags
  • All of these

author avatar

Previous post

Insertion Sort

Mobile telecommunication technologies, you may also like.

switching Techniques

Switching Techniques used in computer network

Slide1

Communication Channels

Slide1

Leave A Reply Cancel reply

You must be logged in to post a comment.

Login with your site account

Remember Me

Not a member yet? Register now

Register a new account

Are you a member? Login now

COMMENTS

  1. Chapter 6: Cyber Safety

    Get solutions of Computer Applications Code 165 CBSE Class 9 Sumita Arora Chapter 6: Cyber Safety. Clear your Computer Applications doubts instantly & get more marks in Computer Applications exam easily. Master the concepts with our detailed explanations & solutions.

  2. Class 9 Computer Application 165 Chapter 6 Cyber Safety Sumita Arora

    Answer: (a) Viruses, worms, adware, trojans and spyware. Que 4. How do you know if a website is secure? (a) When you visit the site, a message appears telling you it is secure. (b) The prefix of the website is HTTPS. (c) Websites cannot be made secure. Answer: (b) The prefix of the website is HTTPS. Que 5.

  3. Cyber Safety

    Get ready to ace your Class 9 exam with Cyber Safety Practice Questions! This comprehensive collection of practice papers and question papers is designed to help you master the exam. Boost your preparation with paper analysis and best books recommended by toppers. Access study material, notes, and sample papers for thorough revision.

  4. NCERT Solutions for Class 9th: Ch 6 Security threats and Safety

    NCERT Solutions for Class 9th: Ch 6 Security threats and Safety Measures Computer Science. 1. Which of the following is an anti-virus program. 2. All of the following are examples of real security and privacy threats except: 3. Trojan horses are very similar to virus in the matter that they are computer programs that replicate copies of ...

  5. Cyber Safety Free MCQ Practice Test with Solutions

    The Test: Cyber Safety questions and answers have been prepared according to the Class 9 exam syllabus.The Test: Cyber Safety MCQs are made for Class 9 2024 Exam. Find important definitions, questions, notes, meanings, examples, exercises, MCQs and online tests for Test: Cyber Safety below. Solutions of Test: Cyber Safety questions in English ...

  6. Sample Paper: Sample Question Paper

    Sample Question Paper Class 9 - Kips Cyber Beans CBSE Computer Code 165. Section A (1 mark each) Question 1. ... Question 24. Case Study 1. ... c. Write two safety measures to be taken by Hari to avoid repeating such mistakes in the future. d. Apart from the bank account details, what is the other type of data that can be stolen by imposters on ...

  7. Cyber Safety

    Cyber Safety Class 9 - Kips Cyber Beans CBSE Computer Code 165. Multiple Choice Questions Question 1 ... Application Based Questions Question 1. While working, Mrs Sharma's system stopped functioning suddenly. ... Write down the ways to report a cyber-crime. Answer. In case of any cyber crime, the matter should immediately be reported to either ...

  8. Class 9: Cyber Safety Revision MCQs

    Unacademy Emerge, Enrollment Link: https://unacademy.onelink.me/bosH/289a7d72In this session, Aakash Sir will be discussing the topic "Cyber Safety Revision ...

  9. NCERT solutions for Information and Communication Technology class 9

    Using NCERT Information and Communication Technology class 9 solutions Safety and Security in the Cyber World exercise by students is an easy way to prepare for the exams, as they involve solutions arranged chapter-wise and also page-wise. The questions involved in NCERT Solutions are essential questions that can be asked in the final exam.

  10. Safety and Security in the Cyber World

    Importance of Safety and Security in the Cyber World Class 9: Understanding Safety and Security in the Cyber World is crucial for Class 9 exam success. Knowing its pattern, syllabus, and question paper analysis can significantly boost preparation. Practice papers and mock tests help improve performance.

  11. Cyber Safety Class 9

    Welcome to the Part 1 of the Chapter on Cyber Safety by Bhargab Kakati. It has been made keeping in mind the students of Class 9 for the subject Computer Ap...

  12. Cyber Safety Class 9

    Cyber Safety Class 9 - Download as a PDF or view online for free ... Case Study on IV&V of the Landing Gear Controller Oak Systems ... SOCIAL NETWORKING NETIQUETTES 'Social Networking' is the use of Internet-based social media sites to stay connected with friends, family, colleagues, customers, or clients. Some of the basic Social ...

  13. NCERT Book for Class 9th Information and Communication ...

    Class 9th is an essential class for every single student. This class is the first step towards the advanced level of the study. Often it is considered that students should give more attention to the class 9th. Because class 9th is the foundation of class 11th. Also, a student from class 9th gets to introduce lots of different and advanced topics.

  14. Class 9 Computer Science Chapter 11 Case Studies Applications of it in

    4. IT Technician: An IT Technician is a professional who is responsible for installing, maintaining, and repairing hardware & software components of the organization's computers. They also support these systems through remote access or site visits as needed by management teams within their company. 5.

  15. Cyber Safety Chapter Notes

    C K Academy. Document Description: Chapter Notes: Cyber Safety for Grade 9 2024 is part of Computer Science for Grade 9 preparation. The notes and questions for Chapter Notes: Cyber Safety have been prepared according to the Grade 9 exam syllabus. Information about Chapter Notes: Cyber Safety covers topics like Introduction and Chapter Notes ...

  16. Chapter 7 Safety and Security in the Cyber World Class 9

    NCERT Book for Class 9 Information and Communication Technology Chapter 7 Safety and Security in the Cyber World is accessible for persuing/read or download on this page. The situations where you don't access to its physical copy, its pdf format will help you there. After the jpg format of chapter you will find a link from where you can ...

  17. What is Cyber Safety?

    👉Previous Video: https://www.youtube.com/watch?v=BWJu8DnifUk👉Next Video: https://www.youtube.com/watch?v=9QSiTfg2qqs ️📚👉 Watch the Full Free Course: http...

  18. Cyber Safety Class 9 full chapter explanation

    #CBSEComputerEducation#IT402In This Channel we will discuss all Classes Class 1 to 8 Computer and Class 9 & 10 Information Technology complete syllabus.Cyber...

  19. NCERT Book for Class 9 ICT Chapter 7 Safety and Security

    Class 9 Information and Communication Technology Chapter 7 Safety and Security in the Cyber World: NCERT Book for Class 9 Information and Communication Technology Chapter 7 Safety and Security in the Cyber World is available for reading or download on this page. Students who are in Class 9 or preparing for any exam which is based on Class 9 Information and Communication Technology can refer ...

  20. Short Answer Type Questions: Cyber Safety

    Document Description: Short Answer Type Questions: Cyber Safety for Grade 9 2024 is part of Computer Science for Grade 9 preparation. The notes and questions for Short Answer Type Questions: Cyber Safety have been prepared according to the Grade 9 exam syllabus. Information about Short Answer Type Questions: Cyber Safety covers topics like and Short Answer Type Questions: Cyber Safety Example ...

  21. Class 9 Computer Applications

    CHAPTER-1: COMPUTER SYSTEM BRAIN DEVELOPER. CHAPTER-2: INPUT AND OUTPUT DEVICES BRAIN DEVELOPER. CHAPTER-3: TYPES OF SOFTWARE BRAIN DEVELOPER. CHAPTER-4: OPERATING SYSTEM BRAIN DEVELOPER. CHAPTER-5: WORKING WITH AN OPERATING SYSTEM. CHAPTER-7: CYBER SAFETY. CHAPTER-8: MICROSOFT WORD 2010 - I.

  22. Computer Networking: Case Study Questions

    Case Study 1: Web server is a special computer system running on HTTP through web pages. The web page is a medium to carry data from one computer system to another. The working of the webserver starts from the client or user. The client sends their request through the web browser to the webserver. Web server takes this request, processes it and ...