Cyber Safety and Security Class 12 NCERT Solutions

In today’s digital age, understanding cyber safety and security is essential for every student. This chapter introduces the fundamentals of protecting personal and organizational data online. It covers key concepts like cybercrime, cyber laws in India, data protection, digital ethics, and safe online practices.

Cyber Safety and Security Class 12 NCERT Solutions

I. Multiple Choice Questions

Q. What is the term used to describe the data you leave behind online?
a. Online shadow
b. Digital echo
c. Digital footprint
d. Online history

Show Answer ⟶
c. Digital footprint

Q. Which of the following is an example of an active component of your digital footprint?
a. Location data collected by your phone (even when not in use)
b. Social media posts you write and share
c. Cookies tracking your browsing history on a website
d. Search queries you use on a private browser

Show Answer ⟶
b. Social media post you write and share

Q. Which of the following is NOT a potential impact of your digital footprint?
a. Shaping your online reputation
b. Protecting your privacy
c. Improving your credit score
d. Influencing targeted advertising

Show Answer ⟶
c. Improving your credit score

Q. Which of the following is NOT a recommended way to manage your digital footprint?
a. Regularly review and delete old or inappropriate posts.
b. Use privacy-focused tools like browsers and search engines.
c. Share all your personal information publicly on social media.
d. Adjust privacy settings on social media and other platforms.

Show Answer ⟶
c. Share all your personal information publicly on social media.

Q. Why is it important to be mindful of your digital footprint?
a. It helps you track your online activity for personal insights.
b. It can have long-term consequences in various aspects of your life.
c. It allows companies to offer you more relevant online services.
d. It is essential for maintaining a large network of online connections.

Show Answer ⟶
b. It can have long-term consequences in various aspects of your life.

Q. What is the primary purpose of data privacy regulations?
a. To restrict the use of the internet
b. To protect personal information from unauthorized access or misuse
c. To control the development of new technologies
d. To censor online content

Show Answer ⟶
b. To protect personal information from unauthorized access or misuse

Q. What kind of data is typically protected by data privacy regulations?
a. Publicly available information, such as names and addresses in phone books
b. Personally identifiable information (PII), such as social security numbers and credit card details
c. Non-identifiable data collected through website cookies
d. All of the above

Show Answer ⟶
b. Personally identifiable information (PII), such as social security numbers and credit card details

Q. What is the best way to protect your data privacy online?
a. Sharing all your personal information with websites and apps
b. Using strong passwords and keeping them confidential
c. Clicking on all links in emails, even from unknown senders
d. Disabling all privacy settings on your social media accounts

Show Answer ⟶
b. Using strong passwords and keeping them confidential

Q. Which of the following is NOT an example of an IPR?
a. Copyright
b. Trademark
c. Patent
d. Trade secret

Show Answer ⟶
d. Trade secret

Q. What right does a copyright grant the owner?
a. The exclusive right to use the invention commercially
b. The exclusive right to use a symbol or logo to identify a product or service
c. The exclusive right to control the reproduction and distribution of an original work
d. The exclusive right to prevent unauthorized access to confidential information

Show Answer ⟶
c. The exclusive right to control the reproduction and distribution of an original work

Q. What is the key difference between a patent and a copyright?
a. Copyrights protect ideas, while patents protect the physical embodiment of an idea.
b. Patents have a longer duration of protection than copyrights.
c. Only tangible objects can be patented, while copyrights can protect intangible works.
d. All of the above

Show Answer ⟶
d. All of the above

Q. What is the primary goal of a phishing attack?
a. To spread malware and harm computer systems.
b. To steal personal information such as passwords, credit card details, or login credentials.
c. To disrupt website traffic and cause service outages.
d. To promote a specific product or service.

Show Answer ⟶
b. To steal personal information such as passwords, credit card details, or login credentials.

Q. _ theft is when someone uses your personal data to impersonate you, typically to steal from you.
a. Cyberstalking
b. Cyberbullying
c. Identity Theft
d. Email Spoofing

Show Answer ⟶
c. Identity Theft

Q. In _, the email is received from a forged email address, but it appears to be from some authentic source.
a. Email Spoofing
b. Email Forging
c. Email harassment
d. Email targeting

Show Answer ⟶
a. Email Spoofing

Q. _ is a type of cybercrime that uses the internet and technology to harass or stalk a person.
a. Cyber Harassing
b. Cyber Targeting
c. Cyberstalking
d. Cyber Bullying

Show Answer ⟶
c. Cyberstalking

Q. You receive an email from a popular video game platform claiming you’ve won a free virtual pet. The email asks you to click on a link and enter your username and password to claim your prize. What should you do?
a. Click on the link and enter your information.
b. Ignore the email and report it to your parents or a trusted adult.
c. Forward the email to your friends to share the good news.

Show Answer ⟶
b. Ignore the email and report it to your parents or a trusted adult.

Q. Your best friend asks you to share your login information for a social media platform because they want to see your private messages. What should you do?
a. Share your username and password with your friend.
b. Explain that sharing passwords is risky and suggest they create their own account.
c. Pretend you forgot your password to avoid sharing it.

Show Answer ⟶
b. Explain that sharing passwords is risky and suggest they create their own account.

Q. A popular online challenge encourages users to post embarrassing photos of themselves. Your classmates are participating and pressuring you to join. What should you do?
a. Join the challenge to fit in with your classmates.
b. Politely refuse and explain why you don’t feel comfortable participating.
c. Post a fake photo to avoid getting left out.

Show Answer ⟶
b. Politely refuse and explain why you don’t feel comfortable participating.

Q. You see someone constantly posting mean comments about another student on social media. What should you do?
a. Join the conversation and add your own negative comments.
b. Report the cyberbullying to a teacher or trusted adult.
c. Ignore the situation and hope it goes away on its own.

Show Answer ⟶
b. Report the cyberbullying to a teacher or trusted adult.

Q. I want to download a new movie, but the website asks you to disable your antivirus software first. What should you do?
a. Disable your antivirus software and download the movie.
b. Close the website and look for the movie from a trusted source.
c. Ask your parents for permission before downloading anything online.

Show Answer ⟶
b. Close the website and look for the movie from a trusted source.

Q. You’re playing your favorite online game when another player asks for your phone number to chat outside the game. What should you do?
a. Give them your phone number right away.
b. Ask your parents if it’s okay to share your phone number.
c. Tell them you don’t want to share your phone number and explain that it’s not safe to give out personal information online.

Show Answer ⟶
c. Tell them you don’t want to share your phone number and explain that it’s not safe to give out personal information online.

Q. You receive an email from a company you like offering a free gift card if you click on a link and enter your name and address. What should you do?
a. Click the link and enter your information right away to get the free gift card.
b. Talk to your parents or a trusted adult about the email before clicking anything.
c. Delete the email because it sounds suspicious and you don’t want to get scammed.

Show Answer ⟶
b. Talk to your parents or a trusted adult about the email before clicking anything.

Q. You’re creating a new account on a website, and it asks for your birthday and address. You’re not sure if it’s safe to share that information. What should you do?
a. Enter your birthday and address without thinking twice.
b. Read the website’s privacy policy to understand how they use your information.
c. Only share information that is absolutely necessary to create the account.

Show Answer ⟶
b. Read the website’s privacy policy to understand how they use your information.

Q. You’re using a school computer and accidentally leave yourself logged into your social media account. What should you do?
a. Leave it logged in and hope no one else uses it.
b. Tell your teacher and ask them to log you out.
c. Log out of your account before leaving the computer.

Show Answer ⟶
c. Log out of your account before leaving the computer.

Q. You see a funny meme online about your friend. You think your other friends would find it funny too, so you share it on your social media page. What should you consider before sharing?
a. Share it right away because it’s funny.
b. Think about how your friend might feel if they saw the meme.
c. Ask your friend’s permission before sharing anything about them online.

Show Answer ⟶
b. Think about how your friend might feel if they saw the meme.

Q. What are some things you can do to create strong passwords?
a. Use the same password for all your online accounts.
b. Use short passwords that are easy to remember.
c. Use a combination of uppercase and lowercase letters, numbers, and symbols.

Show Answer ⟶
c. Use a combination of uppercase and lowercase letters, numbers, and symbols.

Q. You’re scrolling through social media and see a post from a stranger offering “free” followers for your account. What should you do?
a. Click the link and follow the instructions to get more followers.
b. Report the post as suspicious and tell an adult about it.
c. Ignore the post and never share your login information with anyone.

Show Answer ⟶
c. Ignore the post and never share your login information with anyone.

Q. You’re playing an online game with friends, and someone starts sending mean messages in the chat. What should you do?
a. Engage with the person and respond with mean messages back.
b. Report the player to the game moderators and explain the situation.
c. Mute the player and continue playing without engaging in the negativity.

Show Answer ⟶
b. Report the player to the game moderators and explain the situation.

Q. You receive a text message from an unknown number claiming to be from your bank and asking you to confirm your account information. What should you do?
a. Reply to the message with your account details to verify your information.
b. Call your bank directly using a phone number you know is correct, not the one provided in the text.
c. Delete the message and avoid clicking on any links it might contain.

Show Answer ⟶
b. Call your bank directly using a phone number you know is correct, not the one provided in the text.

Q. You’re creating a new online profile for a school project and need to include pictures. What should you consider before uploading pictures online?
a. Only upload pictures that you’re comfortable with everyone seeing, including future employers and colleges.
b. Avoid uploading pictures that reveal your location or personal information.
c. Ask for permission from anyone else who appears in the photos before uploading them.
d. All of the above

Show Answer ⟶
d. All of the above

Q. You’re watching a video online and see an advertisement offering a free download of a popular game. What should you do?
a. Click the download link without hesitation to get the free game.
b. Only download games from trusted sources like official app stores.
c. Read reviews and do research on the game and download the source before proceeding.

Show Answer ⟶
b. Only download games from trusted sources like official app stores.

Q. You’re working on a school project and find a website that offers free research papers on your chosen topic. Is it okay to download and use the entire paper for your project?
a. Yes, it’s a great way to save time and get a good grade.
b. No, using someone else’s work without permission is plagiarism and can lead to trouble with your teacher.
c. It’s okay if you cite the website as your source, even if you don’t change anything in the paper.

Show Answer ⟶
b. No, using someone else’s work without permission is plagiarism and can lead to trouble with your teacher.

Q. You receive a message from an unknown number claiming to be your bank and asking you to confirm your account information due to suspicious activity. What should you do?
a. Click the link in the message and enter your information as instructed.
b. Delete the message and contact your bank directly through a known phone number or website.
c. Tell your parents or a trusted adult about the message and ask them for help.

Show Answer ⟶
b. and c. both

Q. You’re scrolling through your social media feed when you see a friend post a challenge that involves downloading an unknown app to access a hidden filter. What should you do?
a. Download the app right away to try the filter.
b. Talk to your friend about the risks of downloading unknown apps and suggest finding a safer alternative.
c. Report the post to the social media platform for promoting potentially dangerous content.

Show Answer ⟶
b. and c. both

Q. You’re creating a new online game account and are asked to choose a username. You want to choose a username that’s cool and unique, but it also contains your real name. What should you do?
a. Choose the username that includes your real name because it’s easy to remember.
b. Think of a creative username that doesn’t reveal your real name or personal information.
c. Ask your parents or a trusted adult for suggestions on creating a safe and appropriate username.

Show Answer ⟶
b. and c. both

II. Answer the following questions.

Q. Define cybercrime. Explain at least two types of cybercrimes.

Answer: Cybercrime is the criminal act that takes place over the internet through computers as tools or targets or other smart devices meant for making our work easier. Several examples of cybercrime include fraud, identity theft, cyberstalking, and creating and sending malware like viruses for destroying the systems or stealing the data to make money.

Q. Differentiate between

a) Cyberbullying and Cyberstalking

Answer: Cyberbullying is the use of electronic means to bully or harass another person. It can happen anywhere online, including social media, messaging platforms, gaming platforms, and even text messages. Cyberstalking is a type of cybercrime that uses the internet and technology to harass or stalk an individual, group, or organization that causes them fear.

b) Malware and Ransomware

Answer: Malware attacks involve the use of malicious software (malware) to harm or exploit a computer system, server, or network. Ransomware is a type of malware that prevents or limits users from accessing their system until a ransom is paid. Ransomware is a type of malicious software (malware) that encrypts a victim’s files, rendering them inaccessible and unusable.

c) Trademark and Copyright

Answer: A trademark is a type of intellectual property that consists of a recognizable sign, design, or expression that identifies a specific product or service from a particular source and distinguishes it from others. Copyright is a type of intellectual property that protects original works of authorship. It grants the creator (or their designated owner) exclusive rights to control how their work is used, for a limited time.

d) Phishing and DoS Attacks

Answer: Phishing is a type of deceptive cybercrime that involves tricking people into providing sensitive information, such as passwords or credit card numbers, by posing as a trustworthy source. DoS attacks aim to disrupt the normal functioning of a website or server by overwhelming it with traffic, making it unavailable to legitimate users.

Q. List some security measures that should be followed to be safe from the dreadful act of cybercrime.

Answer: Some of the security measures that you should follow to be safe from the dreadful act of cybercrime are:

  • Use a strong, unique password.
  • Enable two-factor authentication.
  • Avoid clicking on suspicious links.
  • Think before you share.
  • Keep software and antivirus programs updated.
  • Use a secure Wi-Fi network.
  • Regularly review privacy settings.
  • Report and block cyberbullying, scams, or suspicious activity.

Q. Define the term “digital footprint” and differentiate between active and passive digital footprints with an example of each.

Answer: Digital footprint is also known as digital shadow or electronic footprint. For example, if you walk in sand, then you leave footprints in the sand. In the same manner, when you use the internet, then each and every click on internet, every search, and every message you send create your online record, which is known as a digital footprint. The difference between active and passive digital footprints is:

  • Active Digital Footprint: An active data footprint refers to the data that is deliberately provided by an individual through their online activities.
  • Passive Digital Footprint: A passive data footprint refers to the data that is collected automatically through an individual’s online activities, without their intentional participation.

Q. Explain why managing your digital footprint is important. Discuss one positive and one negative impact of digital footprints.

Answer: A digital footprint is important because:

  • Your digital footprint can be searched by employers or strangers.
  • If anything is online, then it is very difficult to erase completely.
  • It affects not just your personal safety but also your professional future.

Positive Impact

If the digital footprint is well managed, then it can help the recruiters, collaborators, or scholarship committees to understand your portfolio. A digital footprint shows your interests, skills, and values, which helps to build trust.

Negative Impact

Posting inappropriate content can lead to identity theft, cyberbullying, or long-term damage to your reputation.

Q. Describe the importance of responsible online behavior and how cyber laws contribute to it.

Answer: The importance of the cyber laws is that they contribute to the following:

  • Protects Personal Privacy
  • Prevents Cyberbullying and Harassment
  • Reduces spread of misinformation
  • Promotes digital citizenship
  • Minimizes cyber threats

Q. Identify an object or concept in your daily life that would be protected by each of the following:

a) Patent b) Copyright c) Trademark.

Answer:

  • Patent: A patent is a legal right granted by a government to an inventor, giving them exclusive rights to their invention for a limited time in exchange for publicly disclosing details about the invention in a patent application.
  • Copyright: Copyright is a type of intellectual property that protects original works of authorship. It grants the creator (or their designated owner) exclusive rights to control how their work is used, for a limited time.
  • Trademark: A trademark is a type of intellectual property that consists of a recognizable sign, design, or expression that identifies a specific product or service from a particular source and distinguishes it from others.

III. Answer the following application-based questions.

Q. You are helping your younger sibling set up their first social media account. They are excited to connect with friends and share their interests online. What advice would you give your sibling about creating a safe and responsible digital footprint from the beginning? Explain your reasoning for each piece of advice.

Answer: To help your sibling to set up social media:

  • Use a strong password.
  • Keep personal info private.
  • Think before posting.
  • Be kind and respectful on the internet.

Q. You receive a message from an unknown number, claiming to be your favorite celebrity and offering you a chance to win a prize. What are some red flags that might indicate this is a scam, and what steps would you take?

Answer: If you receive a message from an unknown number, then you have to take the following steps.

  • The red flags
  • Asking for personal info or money
  • Suspicious links or urgency (“Act now!”)
  • Unverified account or number

Steps to take

  • Do not reply or click on the link.
  • Block the number.
  • Report the message to the platform.
  • Talk to the parents.

Q. You’re playing an online game with a friend. They ask you to click on a link to download a cool new skin for your character. What questions would you ask your friend before clicking on the link?

Answer: You can handle this situation by asking questions like.

  • Is this, like, from the official website?
  • Have you downloaded from it before?
  • Does it ask for personal info?
  • Can you show me reviews or proof it is safe?

Q. You see a funny meme online that makes fun of a classmate. Even though you don’t agree with the message, some of your friends are pressuring you to share it. How would you handle this situation, and why?

Answer: To handle this situation, you should do the following:

  • Don’t share it. Explain to friends that it is harmful.
  • Support your classmate privately if needed.
  • Report the post if it violates platform rules.

Links can contain malware or phishing traps. Always verify before clicking.

Q. You accidentally post a picture online that you later regret. How would you try to remove the picture, and what lessons did you learn from this experience?

Answer: The following steps you have to do.

  • Delete the post immediately.
  • Ask others not to share or repost it.
  • Check if it is saved or shared elsewhere.
  • We learn that sharing hurtful content encourages bullying and damages trust.

The lesson we have learned is to think twice before posting. Once online, content can spread quickly and be hard to erase.

Q. You overhear two classmates talking about using someone else’s login information to access a restricted website at school. What are some possible consequences of their actions, and what would you do in this situation?

Answer: If you are opening someone else’s login, then:

Consequences:

  • Suspension or disciplinary action.
  • Loss of trust from teachers and peers.
  • Legal issues if data is misused.

What to Do:

  • Don’t participate.
  • Consider informing a teacher or counselor.
  • Encourage classmates to act responsibly.

Q. You receive a direct message on social media from someone you don’t know. The message claims you’ve won a contest and asks for your personal information to claim your prize. What are some red flags in this scenario? How can you verify if the contest is legitimate?

Answer: The red flags in this scenario are

Red Flags:

  • Unknown sender.
  • Requests for personal or financial info.
  • No official website or contact details.

How to Verify:

  • Search the contest online.
  • Check the sender’s profile.
  • Ask your teacher.

Q. You come across a website that is offering free downloads of the latest video game. The website looks unprofessional and has a lot of pop-up ads.Is it safe to download the game from this website? Why or why not?What are the potential risks involved?

Answer: No, it is not safe because the pop-up ads and poor design may contain viruses or steal data, and because of this, the malware, identity theft, or your device can be damaged.

Q. You come across a social media post that is promoting a product that seems too good to be true. How can you evaluate the legitimacy of this post and the product it is advertising? What steps would you take to verify its authenticity before sharing it or making a purchase?

Answer: The steps to verify its authenticity before sharing are:

  • Check reviews and ratings.
  • Look for a verified seller badge.
  • Search for scam reports.

Steps to Verify:

  • Visit the official website.
  • Ask others if they have used it.
  • Avoid sharing or buying until confirmed.

Q. You receive an email from a company claiming to be your bank, asking you to verify your account information by clicking on a link. What red flags should you look for to identify if this might be a phishing scam attempting to steal your data? How can you safely verify your bank account information if needed?

Answer: You can verify by using the sender address if the link does not match the bank’s official site. You can also take the following safe steps, like

  • Don’t click the link.
  • Visit your bank’s official website directly.
  • Call customer service using the number on your bank card.

Disclaimer: We have taken an effort to provide you with the accurate handout of “Cyber Safety and Security Class 12 NCERT Solutions“. If you feel that there is any error or mistake, please contact me at anuraganand2017@gmail.com. The above CBSE study material present on our websites is for education purpose, not our copyrights. All the above content and Screenshot are taken from Web Application Class 12 Subject Code 803 CBSE Textbook, Sample Paper, Old Sample Paper, Board Paper and Support Material which is present in CBSEACADEMIC website, This Textbook and Support Material are legally copyright by Central Board of Secondary Education. We are only providing a medium and helping the students to improve the performances in the examination. 

Images and content shown above are the property of individual organizations and are used here for reference purposes only.

For more information, refer to the official CBSE textbooks available at cbseacademic.nic.in

cbseskilleducation

Leave a Comment