English

How would you recognize if one of your friends is being cyberbullied? Cite the online activities which would help you detect that your friend is being cyberbullied. - Computer Science (Python)

Advertisements
Advertisements

Question

How would you recognize if one of your friends is being cyberbullied?

Cite the online activities which would help you detect that your friend is being cyberbullied.

Short Note

Solution

Some activities which may help to detect that my friend is being cyberbullied are:

  • Checking his Social Media accounts like Facebook, Twitter, WhatsApp, etc.
  • Checking his Email account like Gmail, yahoo, etc.
shaalaa.com
Cyber Crimes
  Is there an error in this question or solution?
Chapter 11: Societal Impact - Exercise [Page 248]

APPEARS IN

NCERT Computer Science [English] Class 11
Chapter 11 Societal Impact
Exercise | Q 11. a) | Page 248

RELATED QUESTIONS

Ms Raveena Sen is an IT expert and a freelancer. She recently used her skills to access the Admin password for the network server of Super Dooper Technology Ltd. and provided confidential data of the organization to its CEO, informing him about the vulnerability of their network security. Out of the following options (i) to (iv), which one most appropriately defines Ms Sen?

Justify the reason for your chosen option :
1) Hacker

2) Cracker

3) Operator

4) Network Admin


After a fight with your friend, you did the following activities. Which of these activities is not an example of cyber bullying?


After practicals, Atharv left the computer laboratory but forgot to sign off from his email account. Later, his classmate Revaan started using the same computer. He is now logged in as Atharv. He sends inflammatory email messages to few of his classmates using Atharvs email account. Revaans activity is an example of which of the following cybercrime? Justify your answer.


Exploring appropriate and ethical behaviours related to online environments and digital media.


In ethical hacking and cyber security, there are ______ types of scanning.  


Which of the following crime(s) is/are covered under cybercrime?

  1. Stealing a brand new hard disk from a shop.
  2. Get into an unknown person's social networking account and start messaging on his behalf.
  3. Copying some important data from a computer without taking permission from the owner of the data.
  4. Working on someone's computer with his/her permission.

The primary law in India dealing with cybercrime and electronic commerce is ______


______ is a term used to describe the legal issues related to using of communications technology, particularly "cyberspace", i.e. the Internet.


Describe why it is important to secure your wireless router at home. Search the Internet to find the rules to create a reasonably secure password. Create an imaginary password for your home router. Will you share your password for the home router with the following people? Justify your answer.

  1. Parents
  2. Friends
  3. Neighbours
  4. Home Tutors

Which of the following is not a type of cybercrime?


Share
Notifications

Englishहिंदीमराठी


      Forgot password?
Use app×