Page 21 - English Grammar - IX-X
P. 21

In  the  year  2015,  around  760  million  new  infections  were  recorded.  The  growth  in
                 the malware has been an astonishing 400% in the past five years.

            (6)  Either you are downloading something from the Internet or trying to view any website,
                 no action can be deemed as completely safe. Three-quarters of even the safe websites
                 have  been  detected  with  vulnerabilities.  Emails  have  been  the  favourite  means  of
                 attack for cyber criminals and hackers as they can easily dupe the users in their trap.
            (7)  So,  if  you  like  to  browse  the  Internet  for  information,  do  social  networking,  or  use
                 Google for learning new things, you must always remain cautious. Use a robust antivirus
                 program and stay away from anything that looks fishy or unusual. You must always
                 remember that the Internet is a very powerful tool, but also do not forget that it can
                 be used as a powerful weapon, too, by the cyber criminals.

             On the basis of your understanding of the passage, answer the following questions.
             1.  What reason could you infer for the rise in the incidents of cybercrime in the past years?

                 (a)  Cyber criminals have understood the fact that every Internet user is a cash cow.
                 (b)  Cyber criminals are able to float various infections in the form of viruses, malware, etc.

                 (c)  People consider use of Internet as a means to pass time, using cyber bullying as
                      one of their reasons for boredom.
                 (d)  The rise in the cases of cybercrime indicates the government’s lack of control on
                      the Internet.
             2.  What  can  you  infer  about  the  safety  precautions  that  should  be  taken  to  minimise
                 the danger of cybercrime?
                           (i)                (ii)                (iii)                (iv)

                     Create social       Only post true       Never share         Refrain from
                    media accounts      information and        passwords        accepting friend
                       only after        real picture of      or personal        requests from
                  completion of your  yourself on social     information on       people who
                     higher studies.        media.         social media sites.  don’t have good
                                                                               relations with you
                                                                                    at work.

                 (a)  Option (i)      (b)  Option (ii)     (c)  Option (iii)    (d)  Option (iv)
             3.  How do cyber criminals trap the users?

                 (a)  Through the internet                        (b)  Through calls
                 (c)  Through text messages                       (d)  Through movies




                                                                                               19
   16   17   18   19   20   21   22   23   24   25   26