Advertisements
Advertisements
Question
How would you recognize if one of your friends is being cyberbullied?
Cite the online activities which would help you detect that your friend is being cyberbullied.
Solution
Some activities which may help to detect that my friend is being cyberbullied are:
- Checking his Social Media accounts like Facebook, Twitter, WhatsApp, etc.
- Checking his Email account like Gmail, yahoo, etc.
APPEARS IN
RELATED QUESTIONS
Ms Raveena Sen is an IT expert and a freelancer. She recently used her skills to access the Admin password for the network server of Super Dooper Technology Ltd. and provided confidential data of the organization to its CEO, informing him about the vulnerability of their network security. Out of the following options (i) to (iv), which one most appropriately defines Ms Sen?
Justify the reason for your chosen option :
1) Hacker
2) Cracker
3) Operator
4) Network Admin
After a fight with your friend, you did the following activities. Which of these activities is not an example of cyber bullying?
After practicals, Atharv left the computer laboratory but forgot to sign off from his email account. Later, his classmate Revaan started using the same computer. He is now logged in as Atharv. He sends inflammatory email messages to few of his classmates using Atharvs email account. Revaans activity is an example of which of the following cybercrime? Justify your answer.
Exploring appropriate and ethical behaviours related to online environments and digital media.
In ethical hacking and cyber security, there are ______ types of scanning.
Which of the following crime(s) is/are covered under cybercrime?
- Stealing a brand new hard disk from a shop.
- Get into an unknown person's social networking account and start messaging on his behalf.
- Copying some important data from a computer without taking permission from the owner of the data.
- Working on someone's computer with his/her permission.
The primary law in India dealing with cybercrime and electronic commerce is ______
______ is a term used to describe the legal issues related to using of communications technology, particularly "cyberspace", i.e. the Internet.
Describe why it is important to secure your wireless router at home. Search the Internet to find the rules to create a reasonably secure password. Create an imaginary password for your home router. Will you share your password for the home router with the following people? Justify your answer.
- Parents
- Friends
- Neighbours
- Home Tutors
Which of the following is not a type of cybercrime?