Ch-6 Cyber Security and Digital Citizenship
1. Write full forms of the following abbreviations:
a. MFA = Multi-Factor Authentication
b. 2FA = Two-Factor Authentication
c. ETA = Electronic Transactions Act
d. VPN = Virtual Private Network
e. DDoS = Distributed Denial of Service
f. XSS = Cross-Site Scripting
2. Choose the correct answer:
a. The full form of ETA is
i. Electronic Transaction Act
b. Who registers complaints of cybercrime in Nepal?
iii. Cyber Bureau of Nepal
c. ___________ is not an example of antivirus software.
ii. Firewall
d. Which of the following is not a cybercrime?
ii. Authentication
e. Cyber law is commonly known as
ii. digital legislation
f. The Electronic Transactions Act of Nepal also consists of ____________.
ii. cyber laws
g. The combination of username and _______ is basically known as a user credential.
i. password
h. When was the Electronic Transactions Act published?
i. 2063 B.S
3. Write short answers to these questions:
i. What is Cybersecurity?
Ans:Cybersecurity is the practice of protecting computers, networks, and data from cyber attacks, hacking, and unauthorized access.
ii. Explain Cyber Law by relating it with the constitution.
Ans: Cyber law is a set of laws that deal with crimes and legal issues related to computers and the internet. In Nepal, cyber law supports the constitution by protecting citizens’ digital rights, privacy, and online security.
iii. What is a Firewall? Why is it different from antivirus software?
Ans: A firewall is a security system that controls incoming and outgoing network traffic. It is different from antivirus software because a firewall blocks threats before they enter the system, while antivirus software removes viruses after they enter.
iv. You use digital devices on a daily basis. What do you know about digital society?
Ans: A digital society is a society where people use digital technologies like computers, mobile phones, and the internet for communication, education, business, and daily activities.
v. What is malware? Write down the different types of malwares.
Ans: Malware is harmful software designed to damage or steal data from a computer.
Types of malware include virus, worm, Trojan horse, spyware, ransomware, and adware.
4. Write long answers to these questions:
a. Define malware and describe its types.
Ans: Malware is malicious software created to harm computers, networks, or data.
Types of malware include:
(i) Virus: Attaches to files and spreads when the file is opened.
(ii) Worm: Spreads automatically through networks.
(iii) Trojan horse: Appears useful but harms the system.
(iv) Spyware: Steals personal information secretly.
(v) Ransomware: Locks data and demands money to unlock it.
b. Explain about digital footprint and write the advantages and disadvantages of it.
Ans: A digital footprint is the record of a person’s online activities such as social media posts, searches, and emails.
Advantages:
- Helps build online identity
- Useful for learning and communication
Disadvantages:
- Can affect privacy
- Can be misused if personal data is shared carelessly
c. Explain the safe browsing techniques.
Ans: Safe browsing techniques include:
(i) Using strong passwords
(ii) Avoiding suspicious links and websites
(iii) Installing antivirus software
(iv) Updating software regularly
(v) Not sharing personal information online
d. Define Cybercrime. Explain the prevention method from cybercrime.
Ans: Cybercrime is illegal activity done using computers and the internet, such as hacking, phishing, and identity theft.
Prevention methods:
(i) Use strong passwords
(ii) Enable two-factor authentication
(iii) Avoid unknown emails and links
(iv) Use updated security software
(v) Report cybercrime to the Cyber Bureau of Nepal
e. Explain about netiquette guidelines.
Ans: Netiquette guidelines are rules for good behavior while using the internet.
They include:
(i) Being polite and respectful online
(ii) Not spreading false information
(iii) Respecting others’ privacy
(iv) Avoiding cyberbullying
(v) Using appropriate language