Class 10 SEE English Guide | Unit-7 Cyber Security 2080 Nepal

Book Soluction Nepal
0

 Class 10 SEE English Guide

Unit-7 

Cyber Security 2080

Parents
A. Choose the words/phrases given below and write against the correct definitions.
[munching, ridiculous, window shopping, stammer, obsessed, lurking, outfit, leer, swerve, stamp]

a. remaining hidden so as to wait for somebody secretly -lurking

b. preoccupied with something continually to a troubling extent-obsessed

c. the act of looking at goods displayed in shop windows without intending to buy them-window shopping

d. bringing down one's feet heavily down on the ground-stamp (stamping)

e. deserving or inviting disapproval; absurd- ridiculous

f. a set of clothes worn for a particular occasion or activity-outfit

g. to turn aside abruptly from a straight line or course-swerve

h. eating something hard, steadily and noisily- munching

i. look or gaze in an unpleasant and offensive way- leer

j. speaking with difficulty, repeating sounds or words and often stopping-stammer


B. Rewrite the following sentences in chronological order.
Answer 👉 
c. Anuja told her father that she wanted to see her new friend.

e. She told her father about her new e-friend.

a. Her father accompanied her to meet her friend.

g. He observed that Anuja was looking like a boy in her new dress.

d. She revealed her secret e-identity to her father.

b. They saw a car on the other side of the road.

h. They waited for Anuja's friend for ten minutes.

f. Anuja's father shared the incident with his friend.



C. Read the story again and answer these questions.

a. Why do you think Anuja was unwilling to take her father along with her to meet her new friend?

Answer 👉 Anuja was unwilling to take her father along with her to meet her new friend because she was afraid that his physical appearance, particularly his age, large belly, and baldness, would embarrass her.



b. How does she criticise her father?

Answer 👉 Anuja criticizes her father by calling him obsessed.


c. Describe Anuja's e-friend.

Answer 👉 Anuja's e-friend is 12 and Anuja is very fond of her.


d. What (Why) did Anuja's father propose to go with her?

Answer 👉 Anuja's father proposed to go with her because he wanted to meet her friend and make sure that she was safe.


e. What was the shocking news for her father?

Answer 👉 For her father, the shocking news was that she chatted with her e-friend as a boy.


f. Why did they return without meeting Anuja's friend?

Answer 👉 They returned without meeting Anuja's friend because they couldn't find any girl at the place where they were supposed to meet. They waited for ten minutes and saw a car parked with dark windows on the other side of the road, but it sped away. The narrator concluded that the girl was fake, and they left.


g. Why do you think Dhurva laughed at the story of Anuja's father?

Answer 👉 Dhurva laughed at the story of Anuja's father because he found the situation humorous. He revealed to the narrator that the reason Anuja's friend and her mother did not appear at the meeting place was that they saw an old man with a big stomach and a bald head lurking around.


h. How did the girl's mother see Anuja's father?

Answer 👉 Why didn't they talk to each other? The girl's mother saw Anuja's father from her car as he was lurking around the meeting place. All she could see was an old man with a big stomach and a bald head. They didn't talk to each other because she drove the car back home without meeting him.




D. What can be the consequences of faking your identities and bullying other people on social media and the internet?

👉 

Faking identities and engaging in bullying behavior on social media and the internet can have severe consequences, both for the individuals involved and for society as a whole. Here are some of the potential ramifications:

  1. Emotional and Psychological Harm: Bullying and identity theft can cause significant emotional and psychological distress to the victims. The targeted individuals may experience feelings of humiliation, fear, anxiety, and depression, leading to a decline in their mental well-being. Such actions can also erode their self-esteem and confidence, impacting their overall quality of life.

  2. Damage to Reputation: Faking identities and engaging in online bullying can tarnish a person's reputation. The spread of false information or malicious rumors can have long-lasting effects on an individual's personal and professional life. It can lead to social isolation, loss of job opportunities, and strained relationships, as others may perceive them negatively based on the online content.

  3. Legal Consequences: In many jurisdictions, cyberbullying, identity theft, and harassment are illegal activities. Perpetrators may face legal consequences, including fines and imprisonment, depending on the severity of the offenses committed. Law enforcement agencies are increasingly cracking down on such behavior, and individuals can face legal action if caught engaging in these activities.

  4. Impact on Mental Health and Well-being: Faking identities and engaging in bullying behavior can negatively impact the mental health and well-being of the perpetrators themselves. Constantly maintaining a false online persona and participating in harmful actions can lead to guilt, shame, and a distorted sense of self. Over time, individuals may become desensitized to their actions and struggle with empathy and healthy relationships.

  5. Societal Impact: The prevalence of fake identities and online bullying contributes to a toxic online culture. It erodes trust, empathy, and respectful communication among internet users. This can lead to the creation of hostile online environments, where individuals feel unsafe and discouraged from participating in online discussions or sharing their authentic selves.

It is crucial to raise awareness about the consequences of faking identities and bullying on social media and the internet. By promoting digital ethics, empathy, and responsible online behavior, we can work towards creating a safer and more inclusive digital space for everyone.



Download the Class 10 SEE English book Complete Guide 2080 from the Google play store.





Grammar I
B. Complete the sentences below with should, ought to or must. Use the negative forms where necessary.
Answer 👉 
a. Every child should take good care of their ageing parents.

b. If you want to lose weight, you ought to exercise regularly.

c. A: Someone picked up my pocket.

B: You must inform the police about it.

d. A: How was the movie?

B : It was great. You should go and see it.

e. We must not disrespect our nation at any cost.

f. You look ill. You should see a doctor.

g. In order to maintain healthy habits, we should go to bed early and get up early in the morning.

h. You must not offend people with your harsh words.

i. We should learn to apologise with people to build trust and cooperation.

j. If you find someone's goods, you should try to return them to the respective person.




Writing I
B. Imagine that you are Niti, and that you were unable to attend the function. Write a reply email to Sambridhi apologising for your inability to attend her brother's wedding due to an urgent family business.
Answer 👉 

Subject: Regret for Being Unable to Attend the Wedding Celebration

Dear Sambridhi,

I hope this email finds you in good health and high spirits. Firstly, I would like to express my sincere gratitude for the gracious invitation to your brother Naman's much-anticipated wedding reception. It is with a heavy heart that I write to inform you of our inability to attend this joyous occasion.

Regrettably, unforeseen circumstances have arisen that demand our immediate attention and presence. A pressing family matter has emerged, leaving us with no choice but to prioritize and address it without delay. Though this turn of events has left us deeply disappointed, please know that our thoughts and well wishes will be with Naman and your entire family on this significant day.

We wholeheartedly congratulate Naman on embarking upon this new chapter of life and wish him a lifetime of love, happiness, and togetherness with his partner. May their union be blessed with countless precious moments and memories that will be cherished for years to come.

Please understand the sincerity of our apologies for not being able to join you and your loved ones in celebrating this momentous occasion. We truly value our relationship with you and your family, and it pains us that we will not have the opportunity to personally share in the joy and merriment of the wedding reception.

Once again, we extend our heartfelt congratulations and best wishes to Naman, and we hope that the wedding celebration surpasses all expectations, filling the day with immense joy and creating memories that will be treasured for a lifetime.

Thank you for your understanding and for including us in your special event.

Warm regards,

Rabin Budha





Class 10 SEE English Guide |  Unit-7 Cyber Security 2080 Nepal



Cyber Security: Basic Internet Safety Tips

A. Match the words given below with their meanings.

a. possession- v. something that you own or have with you; belongingness

b. intertwined- viii. closely connected with somebody or something

c. integration- vii. the act of combining two or more things together

d. avoid- i. to prevent something bad from happening

e. sensitive- ii. quick to detect or respond to slight changes or signals

f. proliferated- ix. increased rapidly in number or amount

g. shielding- iv. protecting something from danger or harm

h. promptly- x. without any delay

i. authentication- vi. the act of proving that something is real or true

j. transaction-iii. an act of buying or selling; deal



B. State whether the following statements are true or false.
a. It is a good idea to use the same password in different accounts for safety purpose. - False

b. The teenagers are more vulnerable than any other age groups regarding the internet safety. - False

c. It is not safe to let the computer remember our passwords. - True

d. A cheap debit card is safer than the expensive one. - False

e. It is not safe to enable auto update of software in our devices. - False

f. We should never enter our financial details on websites. - True



C. Read the following paragraph headings and write the correct paragraph name (A-H) against them.
h. Protect your Personal Information with Strong Passwords- A

a. Keep your Personal Data Safe- B

c. Set up Two-factor Authentication-C

f. Pay Attention to Software Updates-D

e. Be Careful about WiFi-E

c. Set up Two-factor Authentication-F

b. Keep Personal Information Private-G

g. Back up your Personal Data-H





D. Answer these questions.

a. How do we try to protect our physical property?
To protect our physical property, we can take several measures such as installing security systems like alarms and cameras, using sturdy locks on doors and windows, and ensuring proper lighting around our property. Additionally, we can also consider insuring valuable possessions and keeping important documents in secure locations like safes or safety deposit boxes.

b. What should we do to keep our passwords secret?
To keep our passwords secret, it is essential to follow good password hygiene practices. This includes creating strong, unique passwords for each online account, avoiding easily guessable information like birthdays or names, and regularly changing passwords. It is also important not to share passwords with anyone, use two-factor authentication when available, and be cautious of phishing attempts or suspicious websites that may try to steal login credentials.


c. Mention any two safety measures for shopping with debit cards.

Two safety measures for shopping with debit cards are:

  1. Regularly monitor account activity: Keep a close eye on your debit card transactions by reviewing your account statements or using online banking services. Report any unauthorized or suspicious charges immediately to your bank.

  2. Use secure payment methods: When shopping online, look for secure websites that use encryption to protect your payment information. Avoid entering your card details on unfamiliar or unsecured websites. Consider using trusted payment gateways or services like PayPal for added security.


d. How can we secure our accounts even when someone finds our password?
To secure our accounts even if someone finds our password, it is crucial to enable two-factor authentication (2FA) wherever possible. Two-factor authentication adds an extra layer of security by requiring an additional verification step, such as a unique code sent to a mobile device or a fingerprint scan. This way, even if someone has the password, they would still need the second factor to access the account.


6. Why do you think we should make online friends only to familiar people?
We should make online friends only with familiar people because it helps ensure our safety and security. By limiting our online connections to people we know and trust, we reduce the risk of interacting with individuals who may have malicious intentions or engage in harmful activities. Building relationships with familiar people online also allows for better communication, understanding, and a sense of shared trust.


g What can we do to keep our online data safe?

To keep our online data safe, we can take the following measures:

  1. Use strong and unique passwords: Create strong, complex passwords for all online accounts and avoid reusing them across multiple platforms. Consider using a password manager to securely store and generate passwords.

  2. Regularly update software and devices: Keep your operating system, antivirus software, and applications up to date with the latest security patches and updates. This helps protect against vulnerabilities that hackers may exploit.

  3. Be cautious of phishing attempts: Be vigilant about suspicious emails, messages, or links that may try to trick you into revealing sensitive information. Avoid clicking on unknown links and verify the legitimacy of websites before entering personal data.

  4. Use encryption and secure networks: When transmitting sensitive information, ensure that the connection is encrypted (look for "https" in the URL) and avoid using public Wi-Fi networks for confidential activities like online banking or shopping.

  5. Regularly backup important data: Make backups of your important files and data to protect against loss or ransomware attacks. Store backups in secure locations, such as external hard drives or cloud storage services with strong security measures.

By following these practices, we can significantly reduce the risk of unauthorized access to our online data and enhance our overall cybersecurity.



E. Have you ever lost your personal data and information while using the internet? Share your experiences in the class.
Answer 👉 
In today's digital age, many people have experienced instances of data breaches, identity theft, or online scams. These incidents can occur through various means such as phishing emails, malware, insecure websites, or even human error like sharing sensitive information unintentionally. It is crucial to be cautious and take preventive measures to safeguard personal data and information online.

It is important to remember that sharing personal experiences related to online data loss or breaches can be sensitive and may vary from person to person. It is advisable to approach such discussions with empathy and respect for everyone's privacy.




Grammar II
A. Complete the sentences below with articles a or an.
Answer 👉 
a. Doctor: What is your problem?
Patient: I have . . a.. . fever and I feel dizzy.

b. Would you like to be.....an....actor in the future?
c. What ....a .. lovely garden you have!

d. We spent half ...an...hour in complete silence.
e. Please keep...an...eye on our house while we are away.

f. Mr. Napit has brought ...a...ewe in his farm.
g. Ms Sharma's opinion was criticised as having...a..one-dimensional perspective.

h. We had to catch...an....early bus to be here on time.




B. Fill in the gaps in the sentences below with a, an or the.
Answer 👉 
a. Could you open ..the.. window, please?

b. Did you read ...the...book I gave you last week?

d. All the desks were full. So we had to sit on ...the..floor.

e. Can you play...the.. flute well?

f. You have ...a..lovely house. I am particularly impressed by ....the...living room.

g. ...The.....President is elected every five years in Nepal.

h. Do you think that the tourist is from Japan? No, she looks like...a..European.

i. This is ...the.. biggest fish I have ever caught in my life.

h. Bhartmani is known to be ...a..man of action.



C. Fill in the blanks with the correct articles. If no article is used, put a cross (X).
Answer 👉 
a. Mrs. Paudel went to ...the...school to meet her son's teacher.
b. What time did you get .....X..... home yesterday?
c. ....The....Netherlands consists of twelve provinces.
d. .....X...Everest is the pride of our country.
e. ...The...Nile is the longest river in Africa.
f. ...X....New Road is a financial hub in Kathmandu.
g. ....X..Aarohan Gurukul Theater was founded in 1982.
h. What did you have for ..X...breakfast this morning?
i. Braille system was developed to help ....the.. blind for reading and writing,
j. Do you always play...X.....badminton at school?





Writing II
Write a newspaper article on "Internet and Cyber Security". Use the following guidelines in your article.
Answer 👉 
Title: Safeguarding Our Digital World: The Importance of Internet and Cyber Security

Subtitle: Protecting Personal Data in an Evolving Digital Landscape

[City], [Date] – In today's interconnected world, where the internet has become an integral part of our daily lives, ensuring robust internet and cyber security measures has never been more crucial. With cyber threats becoming increasingly sophisticated, individuals, businesses, and governments must remain vigilant to safeguard sensitive data and protect against online attacks. This article aims to shed light on the significance of internet and cyber security and provide essential guidelines to navigate the digital landscape securely.

The internet offers unparalleled opportunities for communication, collaboration, and information access. However, this digital realm also harbors risks. Cybercriminals employ various techniques, including phishing, malware, ransomware, and data breaches, to exploit vulnerabilities and compromise personal and organizational data. It is imperative for individuals to understand the potential risks and adopt proactive measures to protect themselves.

First and foremost, strong passwords are the foundation of online security. Using unique, complex passwords and regularly updating them can thwart unauthorized access. Additionally, enabling two-factor authentication adds an extra layer of protection by requiring a secondary verification step. It is crucial to avoid sharing passwords or personal information through unsecured channels, as this can leave individuals vulnerable to identity theft and fraud.

Furthermore, keeping software, operating systems, and antivirus programs up to date is essential. Regular updates patch security vulnerabilities and provide defense against emerging threats. Implementing firewalls and using virtual private networks (VPNs) can also enhance online privacy and shield sensitive information from prying eyes.

When it comes to online transactions, particularly with debit cards, adhering to safety measures is paramount. Firstly, only use trusted and secure platforms for financial transactions. Look for secure payment gateways and ensure the website has a valid SSL certificate, which encrypts data transmission. Secondly, regularly monitor bank statements and report any suspicious activity immediately to mitigate potential financial loss.

While the internet provides opportunities to connect with people worldwide, it is essential to exercise caution when forming online relationships. Sharing personal information or engaging in sensitive conversations should be reserved for familiar individuals to avoid falling victim to scams or identity theft.

In conclusion, the importance of internet and cyber security cannot be overstated. With cyber threats evolving rapidly, individuals and organizations must prioritize safeguarding their digital presence. By adhering to best practices, such as maintaining strong passwords, updating software, being cautious with online transactions, and exercising discretion in forming online connections, we can create a safer digital world for everyone.

Remember, our digital well-being lies in our hands. Let's stay informed, vigilant, and proactive in protecting our online identities and personal data.

Note: This article is for informative purposes only and does not constitute professional advice. Individuals and organizations are encouraged to consult with cybersecurity experts for tailored recommendations based on their specific circumstances.

Click Below Units for view the complete Guide Unitwise for class 10 English Guide SEE






Post a Comment

0 Comments
* Please Don't Spam Here. All the Comments are Reviewed by Admin.
Post a Comment (0)