Cyber Threats & Security Qus. and Ans. Computer Chapter 9 Class 7th

Q.1:- Why there is a need to secure our computer ?

AnsComputer security is the process of preventing and detecting unauthorized use of your computer. Prevention measures help you stop unauthorized users (hackers) from accessing any part of your computer system. Detection helps you to determine whether or not someone attempted to break into your system, if they were successful, and what they may have done.

Q.2:- Why do you understand by Cybercrime? also, mention its categories.

Ans.– A cybercrime is a crime that involves a computer or a computer network. The computer may have been used in committing the crime, or it may be the target. Cybercrime may harm someone’s security or finances.

Here are 5 of the top cybercrimes affecting businesses and individuals in 2022:

  • Phishing Scams.
  • Website Spoofing.
  • Ransomware.
  • Malware.
  • IOT Hacking.

Q.3:- Write the difference between Cyber Stalking and Cyber Bulling. Explain briefly


– Actions that use information and communication technologies to support deliberate, repeated, and hostile behavior by an individual or group, that is intended to harm another or others

– use of communication technologies for the intention of harming another person

– use of Internet service and mobile technologies such as web pages and discussion groups as well as instant messaging or SMS text messaging with the intention of harming another person.


– Cyberstalking is a kind of digital stalking, so the Cyberstalker stalks the victim by digital means.

– The close definition implies the monitoring of the victim’s online activity, sometimes the cyberstalking converts into stalking.

I.e.: think about a Cyberstalker who finds the home address of the victim and starts to stalk him or her offline.

– Chances are that the victim will never be aware of the cyberstalking, so no harm.

– There is still a privacy issue, of course, but it’s another matter.

– Cyberstalking becomes harmful if the Cyberstalker move into action and acts in order to take psychological harm to the victim.

Q.4:- What do you know about the term Phishing ?


  • Phishing is a type of data theft that involves people unknowingly volunteering their personal information to a bad actor.
  • A phishing attempt may utilize an official-looking website, email, or other forms of communication to trick users into handing over details like credit card numbers, social security numbers, or passwords.
  • Phishing websites can appear identical to official websites, prompting users to input their real credentials on the malicious website.

Q.5:- What is Identity theft? Explain briefly.

Ans- Identity theft is a broad term that applies anytime someone steals your personal information, such as your Social Security number, and uses it to create a new account, make a purchase or commit other fraud. Due to the nature of technology and the internet, your personal information is always at risk.

Q.6:- What points should be kept in mind while creating a password?

Ans- 7 Tips For Creating a Better Password

  • Create Strong Passwords.
  • Avoid Passwords Containing Info Easily Found Online.
  • Use a Unique Password for Every Website or App.
  • Avoid Linked Accounts.
  • Use Multi-Factor Authentication.
  • Beware Where You Enter Your Password.
  • Take Note When a Data Breach Occurs.

Q.7:- Explain data backup. What is the advantage of taking a backup?

Ans- The purpose of the backup is to create a copy of data that can be recovered in the event of a primary data failure. Primary data failures can be the result of hardware or software failure, data corruption, or a human-caused event, such as a malicious attack (virus or malware), or accidental deletion of data.

Q.8:- What is firewall ? Why do we use it for our computer?

Ans- Firewalls provide protection against outside cyber attackers by shielding your computer or network from malicious or unnecessary network traffic. Firewalls can also prevent malicious software from accessing a computer or network via the internet.

Leave a Comment