A. Match the words given below with their meanings.
a. possession → v. something that you own or have with you; belongingness
b. intertwined → viii. closely connected with somebody or something
c. integration → vii. the act of combining two or more things together
d. avoid → i. to prevent something bad from happening
e. sensitive → ii. quick to detect or respond to slight changes or signals
f. proliferated → ix. increased rapidly in number or amount
g. shielding → iv. protecting something from danger or harm
h. promptly → x. without any delay
i. authentication → vi. the act of proving that something is real or true
j. transaction → iii. an act of buying or selling; deal
B. State whether the following statements are true or false.
a. It is a good idea to use the same password in different accounts for safety purpose. → False
b. The teenagers are more vulnerable than any other age groups regarding the internet safety. → False
c. It is not safe to let the computer remember our passwords. → True
d. A cheap debit card is safer than the expensive one. → False
e. It is not safe to enable auto update of software in our devices. → False
f. We should never enter our financial details on websites. → True
C. Read the following paragraph headings and write the correct paragraph name (A-H) against them.
a. Keep your Personal Data Safe → B
b. Keep Personal Information Private → G
c. Set up Two-factor Authentication → F
d. Make Sure your Devices are Secure → C
e. Be Careful about WiFi → E
f. Pay Attention to Software Updates → D
g. Back up your Personal Data → H
h Protect your Personal Information with Strong Passwords → A
D. Answer these questions.
a. How do we try to protect our physical property?
To protect our physical property, we use measures such as locking doors, using locks, and keeping valuable possessions in safes.
b. What should we do to keep our passwords secret?
To keep our passwords secret, we should follow these measures:
- Create strong passwords using a combination of letters, numbers, and special characters.
- Use different passwords for different accounts.
- Keep passwords private and avoid sharing them with others.
- Store passwords securely, such as in an encrypted file on a computer.
c. Mention any two safety measures for shopping with debit cards.
Safety measures for shopping with debit cards:
- Use chip debit cards, as they offer more security compared to traditional magnetic strip debit cards.
- Read the terms and conditions before entering financial information on any website to ensure it is secure.
d. How can we secure our accounts even when someone finds our password?
We can secure our accounts even when someone finds our password by enabling two-factor authentication. This adds an extra layer of security, requiring a second verification step (such as a code sent to a mobile device) to access the account.
e. Why do you think we should make online friends only to familiar people?
We should make online friends only with familiar people to ensure our safety and security. Connecting with strangers online can be risky, and it is essential to be cautious while communicating with people we have recently met online.
g. What can we do to keep our online data safe?
To keep our online data safe, we can take the following measures:
- Utilize passwords, fingerprint readers, or face scanning technology for security.
- Secure all devices, including computers, phones, tablets, smartwatches, and smart TVs.
- Avoid connecting to unsecured public Wi-Fi networks and only surf through secure websites.
- Enable two-factor authentication for added security.
- Be cautious about revealing personal details and be mindful of who we accept as friends on social media.
E. Have you ever lost your personal data and information while using the internet? Share your experiences in the class.
Yes, I have lost my personal data and information while using the internet. One time, I was using a public Wi-Fi network and I didn't realize that it was unsecured. I logged into my bank account and my email account while I was connected to that network. A few days later, I started getting emails from my bank about unauthorized transactions. I realized that my account had been hacked and my personal information had been stolen. I had to change my passwords and I had to file a report with my bank.
A. Complete the sentences below with articles a or an.
a. Doctor: What is your problem?
Patient: I have a fever and I feel dizzy.
b. Would you like to be an actor in the future?
c. What a lovely garden you have!
d. We spent half an hour in complete silence.
e. Please keep an eye on our house while we are away.
f. Mr. Napit has brought an ewe in his farm.
g. Ms. Sharma's opinion was criticised as having a one-dimensional perspective.
h. We had to catch an early bus to be here on time.
B. Fill in the gaps in the sentences below with a, an or the.
a. Could you open the window, please?
b. Did you read the book I gave you last week?
c. All the desks were full. So we had to sit on the floor.
d. Can you play the flute well?
e. You have a lovely house. I am particularly impressed by the living room.
f. The president is elected every five years in Nepal.
g. Do you think that the tourist is from Japan? No, she looks like a European.
h. This is the biggest fish I have ever caught in my life.
i. Bhartmani is known to be a man of action.
C. Fill in the blanks with the correct articles. If no article is used, put a cross (X).
a. Mrs. Paudel went to the school to meet her son's teacher.
b. What time did you get X home yesterday?
c. The Netherlands consists of twelve provinces.
d. X Mount Everest is the pride of our country.
e. The Nile is the longest river in Africa.
f. X New Road is a financial hub in Kathmandu.
g. X Aarohan Gurukul Theater was founded in 1982.
h. What did you have for X breakfast this morning?
i. The Braille system was developed to help the blind for reading and writing.
j. Do you always play X badminton at school?
Write a newspaper article on "Internet and Cyber Security". Use the following guidelines in your article.
Introduction to the internet and technology
Use of the internet in our daily lives
The abuses of the internet
Need and ways of data privacy
Internet and Cyber Security: Safeguarding the Digital Realm
By Yaman Sherpa
August 4, 2023
In the modern era, the internet has become an integral part of our lives, transforming the way we connect, learn, and conduct business. Its role in enabling global communication, facilitating online transactions, and providing information at our fingertips cannot be overstated. Yet, this convenience comes with a downside: the looming threat of cyber security breaches.
The Digital Revolution in Our Daily Lives
Our daily routines are intertwined with the internet. It enables quick access to information and bridges distances effortlessly. From online banking to social media interactions, its impact is pervasive. However, this increased connectivity exposes us to cyber threats that exploit vulnerabilities and compromise our online security.
Navigating the Shadows: Abuses of the Internet
As we enjoy the benefits of the internet, cybercrimes cast a shadow. Cybercriminals exploit weak points to steal identities, conduct phishing scams, and execute ransomware attacks. Simultaneously, the spread of misinformation challenges the authenticity of online content. Addressing these abuses requires a holistic approach to internet security.
Safeguarding Data Privacy: A Growing Imperative
Personal data protection is paramount. Safeguarding financial information and personal details from unauthorized access is critical. This demands proactive measures such as strong passwords, two-factor authentication, and heightened awareness of phishing attempts. Empowering individuals with these tools can fortify data privacy.
The Road Ahead: Nurturing a Secure Digital Ecosystem
The responsibility of securing the digital realm rests with individuals, corporations, and governments. Integrating cyber security education into curricula prepares the youth for the digital landscape. Corporations need to invest in robust cybersecurity measures to protect customer data. Governments must establish and enforce regulations to deter cybercrime.
Conclusion: Balancing Convenience and Security
The internet has transformed our lives, offering unparalleled convenience and opportunities. However, we must tread carefully, aware of the risks it presents. Fostering a culture of cyber security is essential to harness its benefits while minimizing vulnerabilities. With collective effort, we can ensure a secure digital future for all.