Class 10 English Unit 7 Cyber Security – Complete SEE Notes and Exercise with Solutions
Importantedunotes.com

Class 10 English Unit 7
Cyber Security

Complete exercise solutions for Unit 7 Cyber Security, including Reading I & II, Grammar, and Writing tasks for SEE preparation.

Class 10 English Unit 7 Cyber Security Notes Guide

Reading I: Parents

A. Choose the words/phrases given below and write against the correct definitions.

[munching, ridiculous, window shopping, stammer, obsessed, lurking, outfit, leer, swerve, stamp]

a. remaining hidden so as to wait for somebody secretly
Ans: lurking

b. preoccupied with something continually to a troubling extent
Ans: obsessed

c. the act of looking at goods displayed in shop windows without intending to buy them
Ans: window shopping

d. bringing down one’s feet heavily down on the ground
Ans: stamp (stamping)

e. deserving or inviting disapproval; absurd
Ans: ridiculous

f. a set of clothes worn for a particular occasion or activity
Ans: outfit

g. to turn aside abruptly from a straight line or course
Ans: swerve

h. eating something hard, steadily and noisily
Ans: munching

i. look or gaze in an unpleasant and offensive way
Ans: leer

j. speaking with difficulty, repeating sounds or words and often stopping
Ans: stammer

B. Rewrite the following sentences in chronological order.

a. Her father accompanied her to meet her friend.
Ans: c. Anuja told her father that she wanted to see her new friend.

b. They saw a car on the other side of the road.
Ans: e. She told her father about her new e-friend.

c. Anuja told her father that she wanted to see her new friend.
Ans: a. Her father accompanied her to meet her friend.

d. She revealed her secret e-identity to her father.
Ans: g. He observed that Anuja was looking like a boy in her new dress.

e. She told her father about her new e-friend.
Ans: d. She revealed her secret e-identity to her father.

f. Anuja’s father shared the incident with his friend.
Ans: b. They saw a car on the other side of the road.

g. He observed that Anuja was looking like a boy in her new dress.
Ans: h. They waited for Anuja’s friend for ten minutes.

h. They waited for Anuja’s friend for ten minutes.
Ans: f. Anuja’s father shared the incident with his friend.

C. Read the story again and answer these questions.

a. Why do you think Anuja was unwilling to take her father along with her to meet her new friend?

Ans: Anuja was unwilling to take her father along with her to meet her new friend because she was concerned that his physical appearance, including his age, large belly, and baldness, might cause her embarrassment.

b. How does she criticize her father?

Ans: Anuja criticizes her father by describing him as obsessed.

c. Describe Anuja’s e-friend.

Ans: Anuja’s e-friend is a 12-year-old whom Anuja is very fond of.

d. What (Why) did Anuja’s father propose to go with her?

Ans: Anuja’s father proposed to go with her because he wanted to meet her friend and ensure her safety.

e. What was the shocking news for her father?

Ans: The shocking news for her father was that Anuja had been chatting with her e-friend under the impression that the friend was a boy.

f. Why did they return without meeting Anuja’s friend?

Ans: They returned without meeting Anuja’s friend because they couldn’t locate any girl at the designated meeting place. Despite waiting for ten minutes and noticing a car parked with tinted windows on the opposite side of the road, it quickly drove away. The narrator concluded that the girl they were supposed to meet was likely fake, so they left.

g. Why do you think Dhurva laughed at the story of Anuja’s father?

Ans: Dhurva laughed at the story of Anuja’s father because he found the situation amusing. He informed the narrator that the reason Anuja’s friend and her mother didn’t show up at the meeting place was because they had seen an old man with a large stomach and a bald head lurking around.

h. How did the girl’s mother see Anuja’s father? Why didn’t they talk to each other?

Ans: The girl’s mother saw Anuja’s father from her car as he was lurking around the meeting place. All she observed was an old man with a large stomach and a bald head. They didn’t talk to each other because she immediately drove the car back home without engaging with him.

D. What can be the consequences of faking your identities and bullying other people on social media and the internet?

Answer:

Faking your identity and engaging in bullying on social media and the internet can have significant consequences, both legally and personally. Here are some potential outcomes:

Legal repercussions: Depending on the severity of the bullying and the jurisdiction, the consequences may include criminal charges, such as harassment, defamation, or even cyberbullying. These offenses can lead to fines, restraining orders, probation, or even imprisonment, depending on the circumstances and applicable laws.

Damage to reputation: Engaging in bullying behavior can severely damage your reputation. Once your actions are exposed, it can result in public backlash, loss of friends and social connections, and difficulties in personal and professional relationships. Your online presence may be permanently tarnished, affecting your future opportunities and credibility.

Emotional impact on victims: Cyberbullying can cause significant emotional distress and harm to the victims. It can lead to anxiety, depression, low self-esteem, social isolation, and even suicidal thoughts. Remember that your actions have real-life consequences on the well-being of others.

Social media account suspension: Social media platforms have strict policies against bullying and fake identities. If your activities are reported and found to be in violation of their terms of service, your accounts can be suspended or permanently banned. This can result in losing access to your social connections, online communities, and the ability to interact on those platforms.

Potential legal action from victims: Victims of cyberbullying may choose to take legal action against you. They can file civil lawsuits seeking damages for emotional distress, reputational harm, or other losses resulting from the bullying. This can lead to costly legal proceedings, financial settlements, and a further negative impact on your personal and financial well-being.

Impact on mental health: Engaging in cyberbullying and adopting fake identities can also have negative consequences for your own mental health. It can contribute to a toxic mindset, perpetuating negative behaviors and harming your own self-worth. It may lead to guilt, regret, and a cycle of negativity that affects your overall well-being.

Grammar I: Modal Verbs (Should, Ought to, Must)

A. Read the sentences below and say whether the words in red are used to express advice, moral obligation or compulsion.

a. You should raise your voice against discrimination.
Ans: advice

b. You must abide by traffic rules while driving.
Ans: compulsion

c. You ought to be fair in your judgement.
Ans: moral obligation

B. Complete the sentences below with should, ought to or must. Use the negative forms where necessary.

a. Every child ….. take good care of their ageing parents.
Ans: must

b. If you want to lose weight, you ….. exercise regularly.
Ans: should

c. A: Someone picked up my pocket.
B: You ….. inform the police about it.

Ans: should

d. A: How was the movie?
B : It was great. You ….. go and see it.

Ans: should

e. We ….. disrespect our nation at any cost.
Ans: must not

f. You look ill. You ….. see a doctor.
Ans: should

g. In order to maintain healthy habits, we ….. go to bed early and get up early in the morning.
Ans: should

h. You ….. offend people with your harsh words.
Ans: must not

i. We ….. learn to apologise with people to build trust and cooperation.
Ans: ought to

j. If you find someone’s goods, you ….. try to return them to the respective person.
Ans: ought to

Writing I: Email Writing

B. Imagine that you are Niti, and that you were unable to attend the function. Write a reply email to Sambridhi apologising for your inability to attend her brother’s wedding due to an urgent family business.

From: email@gmail.com

To: sambridhi2@gmail.com

Subject: Apology for Inability to Attend the Wedding

Dear Sambridhi,

I want to express my sincere gratitude for inviting me to your brother Naman’s wedding reception. Unfortunately, I must extend my deepest apologies as my family and I will be unable to attend due to an urgent family matter that cannot be postponed.

We are genuinely saddened that we won’t be able to share in the joy of this special day with you and your family. Please convey our warmest wishes and heartfelt congratulations to your brother Naman. We hope that the wedding is filled with immense happiness, love, and cherished moments that will create lifelong memories.

Once again, I would like to thank you for including us in the celebration, and please accept our sincerest apologies for our absence.

Warm regards,

Niti

Reading II: Cyber Security: Basic Internet Safety Tips

A. Match the words given below with their meanings.

a. possession: v. something that you own or have with you; belongingness

b. intertwined: viii. closely connected with somebody or something

c. integration: vii. the act of combining two or more things together

d. avoid: i. to prevent something bad from happening

e. sensitive: ii. quick to detect or respond to slight changes or signals

f. proliferated: ix. increased rapidly in number or amount

g. shielding: iv. protecting something from danger or harm

h. promptly: x. without any delay

i. authentication: vi. the act of proving that something is real or true

j. transaction: iii. an act of buying or selling; deal

B. State whether the following statements are ‘True’ or ‘False’.

a. It is a good idea to use the same password in different accounts for safety purpose.
Ans: False

b. The teenagers are more vulnerable than any other age groups regarding the internet safety.
Ans: False

c. It is not safe to let the computer remember our passwords.
Ans: True

d. A cheap debit card is safer than the expensive one.
Ans: False

e. It is not safe to enable auto update of software in our devices.
Ans: False

f. We should never enter our financial details on websites.
Ans: True

C. Read the following paragraph headings and write the correct paragraph name (A-H) against them.

a. Keep your personal data safe:
Ans: Paragraph B

b. Keep Personal information private:
Ans: Paragraph G

c. Set up to factor authentication:
Ans: Paragraph F

d. Makes Sure your device are secure:
Ans: Paragraph C

e. Be careful about Wi-Fi:
Ans: Paragraph E

f. Pay attention to software updates:
Ans: Paragraph D

g. Back up your personal data:
Ans: Paragraph H

h. Protect your personal information with a strong passport:
Ans: Paragraph A

D. Answer these questions.

a. How do we try to protect our physical property?

Ans: To protect our physical property, we can take several measures such as using locks, alarms, security cameras, security guards, and insurance.

b. What should we do to keep our passwords secret?

Ans: To keep our passwords secret, we should create strong and unique passwords for each account, avoid using personal information in our passwords, change our passwords regularly, and never share our passwords with anyone.

c. Mention any two safety measures for shopping with debit cards?

Ans: Two safety measures for shopping with debit cards are: Shielding the PIN pad while purchasing with debit cards and using a chip-enabled debit card.

d. How can we secure our accounts even if someone discovers our password?

Ans: We can secure our accounts even if someone finds our password by adding an extra layer of security, such as enabling two-factor authentication, monitoring account activity regularly, and updating passwords promptly.

e. Why do you think it is advisable to make online friends only with familiar people?

Ans: We should make online friends only with familiar people because it can be risky to trust strangers online. Online friendships can be just as meaningful as in-person ones, but it’s important to be cautious and protect our personal information. Some people may not be who they claim to be, and they could have malicious intentions.

f. What can we take to keep our online data safe?

Ans: We can keep our online data safe by using strong passwords, enabling two-factor authentication, being cautious about sharing personal information, using antivirus software, avoiding public Wi-Fi, regularly backing up data, and keeping software up to date with the latest security patches.

E. Have you ever lost your personal data and information while using the internet? Share your experiences in the class.

Answer:

This is a personal question and experiences may vary. Students should share their own experiences in class discussion. Some possible experiences could include:

1. Falling victim to phishing scams where personal information was stolen.

2. Having social media accounts hacked.

3. Downloading malware that compromised personal data.

4. Using public Wi-Fi that wasn’t secure, leading to data interception.

5. Sharing too much personal information online that was then used without permission.

6. Losing access to important accounts due to forgotten passwords or security questions.

Students should discuss what they learned from these experiences and what safety measures they now take to protect their online data.

Grammar II: Articles (A, An, The)

A. Complete the sentences below with articles a or an.

a. Doctor: What is your problem?
Patient: I have ….. fever and I feel dizzy.

Ans: a

b. Would you like to be ….. actor in the future?
Ans: an

c. What ….. lovely garden you have!
Ans: a

d. We spent half ….. hour in complete silence.
Ans: an

e. Please keep ….. eye on our house while we are away.
Ans: an

f. Mr. Napit has brought ….. ewe in his farm.
Ans: a

g. Ms Sharma’s opinion was criticised as having ….. one-dimensional perspective.
Ans: a

h. We had to catch ….. early bus to be here on time.
Ans: an

B. Fill in the blanks with a, an, or the where necessary.

a. ….. Ganga is considered a holy river in India.
Ans: The

b. ….. Bible is considered ….. sacred book of Christians.
Ans: The, the

c. ….. Pacific Ocean is ….. largest ocean in the world.
Ans: The, the

d. ….. Mount Everest is the highest mountain in the world.
Ans: X (No article)

e. ….. earth moves around ….. sun.
Ans: The, the

f. ….. president is elected every 5 years in Nepal.
Ans: The

g. Do you think that ….. tourist is from Japan? No, she looks like ….. European.
Ans: the, a

h. This is ….. biggest fish I have ever caught in my life.
Ans: the

i. Bhartmani is known to be ….. man of action.
Ans: a

C. Fill in the blanks with the correct articles. If no article is used, put a cross (X).

a. Mrs. Paudel went to ….. school to meet her son’s teacher.
Ans: X

b. What time did you get ….. home yesterday?
Ans: X

c. ….. Netherlands consists of twelve provinces.
Ans: The

d. ….. Everest is the pride of our country.
Ans: Mount (or X, but typically “Mount Everest”)

e. ….. Nile is the longest river in Africa.
Ans: The

f. ….. New Road is a financial hub in Kathmandu.
Ans: X

g. ….. Aarohan Gurukul Theater was founded in 1982.
Ans: The

h. What did you have for ….. breakfast this morning?
Ans: X

i. ….. Braille system was developed to help ….. blind for reading and writing.
Ans: The, the

j. Do you always play ….. badminton at school?
Ans: X

Writing II: Newspaper Article

Write a newspaper article on “Internet and Cyber Security”. Use the following guidelines in your article:

  • Introduction to the internet and technology
  • Use of the internet in our daily lives
  • The abuse of the internet
  • Need and ways of data privacy
  • Conclusion

Internet and Cyber Security: Safeguarding Our Digital World

Introduction to the Internet and Technology

In today’s interconnected world, the internet has become an integral part of our lives. It has revolutionized the way we communicate, access information, and conduct business. From social media platforms to online shopping, the internet has opened up endless possibilities. However, with the rapid growth of technology, the need for robust internet and cyber security measures has become paramount.

Use of the Internet in Our Daily Lives

The internet has transformed the way we live, work, and interact. It has brought convenience, efficiency, and instant access to a wealth of knowledge. We rely on the internet for communication, entertainment, banking, healthcare, and much more. From smartphones to smart homes, our lives are increasingly interconnected, enabling us to stay connected and access information from anywhere at any time.

The Abuse of the Internet

While the internet has countless benefits, it is not without its drawbacks. Unfortunately, the same technology that empowers us can also be misused by malicious actors. Cybercriminals exploit vulnerabilities to steal personal information, perpetrate fraud, spread malware, and launch cyberattacks. The abuse of the internet poses significant threats to individuals, businesses, and even governments. It is crucial to recognize and address these challenges to ensure a safer digital environment.

Need and Ways of Data Privacy

In an age where data is considered the new currency, protecting our privacy and sensitive information is of utmost importance. Safeguarding our data begins with practicing good online habits. It involves using strong and unique passwords, enabling two-factor authentication, being cautious about sharing personal information, and regularly updating software and security patches. Employing encryption methods, using virtual private networks (VPNs), and being mindful of the websites and apps we use are also crucial in maintaining data privacy.

Furthermore, organizations and policymakers play a vital role in safeguarding data privacy. Robust regulations, such as the General Data Protection Regulation (GDPR), promote transparency, consent, and accountability when it comes to handling personal data. Encouraging cybersecurity education and awareness programs also empower individuals to protect their online privacy.

Conclusion

As we embrace the benefits of the internet and technology, it is imperative that we prioritize internet and cyber security. We must remain vigilant and proactive in safeguarding our personal information and digital assets. Individuals, businesses, and governments must collaborate to implement strong security measures, raise awareness about cyber threats, and foster a culture of cybersecurity. By doing so, we can fully harness the potential of the internet while mitigating the risks and ensuring a safer and more secure digital future for all.

By: Rukmani Ghimire

Student, Shree Jalpa Devi Secondary School

Suryagadhi-4, Nuwakot

Also Read: Class 10 SEE Notes

Scroll to Top