JR Ii Computer Worksheet ?

Download as pdf or txt
Download as pdf or txt
You are on page 1of 7

BAHRIA COLLEGE ANCHORAGE – ISLAMABAD

CAMBRIDGE WING
COMPUTER SCIENCES SUMMER BREKA TASK
Chapter 01: Storing digital data
Class: JR II
Name: …………………………. Section: ……………………

2
3

5
6

7
TOPIC: Staying Safe Online

1 Think of one website that you have used to get information (For example for a Tiger).

a. Write down the name of the website.

………………………………………………………………………………………………………………

……………………………………………………………………………………………………….……..

b. Wrute down one piece of information you got from this website.

………………………………………………………………………………………………………………

……………………………………………………………………………………………………….……..

2 Think of one online form that you have seen, (For example for creating a Facebook account)

a. Describe the online form.

………………………………………………………………………………………………………………

……………………………………………………………………………………………………….……..

………………………………………………………………………………………………………………

……………………………………………………………………………………………………….……..

b. Write down one item of data collected by the online form.

………………………………………………………………………………………………………………

……………………………………………………………………………………………………….……..

3 What is a website cookie? What are cookies used for?

………………………………………………………………………………………………………………

……………………………………………………………………………………………………….……..

………………………………………………………………………………………………………………

……………………………………………………………………………………………………….……..

………………………………………………………………………………………………………………

……………………………………………………………………………………………………….……..
4 Explain how cookies can make websites easier to use.

………………………………………………………………………………………………………………

……………………………………………………………………………………………………….……..

………………………………………………………………………………………………………………

……………………………………………………………………………………………………….……..

5 Enlist the names of all cyber crimes you have studies in the book.

…………………………………………

…………………………………………

………………………………………….

…………………………………………

…………………………………………

…………………………………………

…………………………………………

…………………..………………………………..………….

…………………..………………………………..………….

…………………..………………………………..………….

…………………..………………………………..………….

…………………..………………………………..………….

…………………..………………………………..………….

…………………..………………………………..………….
6 There are many AV software available on Internet. Search on Internet and write names of any two

AV software.

…………………..………………………………..………….

…………………..………………………………..………….

7 Give a short story of any cyber bullying attack that you, any friend, or any family member of yours

might have encountered. And tell how they survuved that bully attack.

The bully attack could be through harrassment, impersonation, exclusion, dissing or photographs.

………………………………………………………………………………………………………………

……………………………………………………………………………………………………….……..

………………………………………………………………………………………………………………

……………………………………………………………………………………………………….……..

………………………………………………………………………………………………………………

……………………………………………………………………………………………………….……..

………………………………………………………………………………………………………………

……………………………………………………………………………………………………….……..

………………………………………………………………………………………………………………

……………………………………………………………………………………………………….……..

………………………………………………………………………………………………………………

……………………………………………………………………………………………………….……..

You might also like