Subject: Computer Science
Grade: 6(Six)
Unit: 9- Keeping Data Safe
Topics for study: Page 127 (keywords box), Page 128 (keywords box), Page 130 (keywords box), Page 128 to 131
(Authentication Types – Password-based Authentication, Multi-factor Authentication, Biometric Authentication – All
types)
MCQ Question
1. What is the purpose of using a strong b) Identity theft
password? c) Saving money on data
a) To make logging in faster d) Improved security
b) To protect your accounts from unauthorized
access 8. What is identity theft?
c) To save time a) Buying products online
d) To avoid using your name b) Someone pretending to be you to access
your personal information
2. Which of the following is an example of a c) Losing your credit card
safe online practice? d) Sharing your password
a) Sharing your password with a friend
b) Clicking on unknown links 9. How can hackers access sensitive
c) Logging out from a shared computer information?
d) Posting personal information publicly a) By walking into a store
b) By monitoring network traffic
3. What should you do if you receive a c) By logging out of their accounts
suspicious email? d) By using a safe website
a) Open the email immediately
b) Click all the links inside it 10. What type of website should you use for safe
c) Report it or delete it online shopping?
d) Share it with your friends a) Websites with “https” in their URL
b) Websites with “http” in their URL
4. What is one way to protect your computer c) Any website
from viruses? d) Websites with pop-up ads
a) Install antivirus software
b) Use the same password for all accounts 11. What is user authentication?
c) Avoid using Wi-Fi a) Playing online games
d) Never update your software b) Verifying a user's identity to access a
system
5. Why is it important to back up your data? c) Installing software
a) To store extra copies in case of data loss d) Writing a password on paper
b) To share it with everyone
c) To save money 12. Which of the following is NOT a type of
d) To use less memory authentication?
a) Password
6. What is "packet sniffing"? b) Biometric authentication
a) A way to find missing files c) Sending an email
b) Intercepting data being sent over a network d) Multi-factor authentication
c) Sending large packets of files
d) A technique to fix network issues 13. What is a good example of a strong password?
a) 12345678
7. Which of the following is a risk when using b) Password123
public Wi-Fi? c) qW#7yZ8p!
a) Faster internet speeds
d) Your name 20. Which of the following is the weakest type of
password?
14. What is biometric authentication? a) A single word like "password"
a) Using a password b) A mix of numbers, symbols, and letters
b) Using personal traits like fingerprints or c) A random sequence of characters
facial recognition to verify identity d) A password over 12 characters long
c) Answering security questions
d) Logging in with a username 21. What is the main goal of keeping data safe?
a) To prevent access by unauthorized users
15. Which is NOT an example of biometric b) To increase internet speed
authentication? c) To share data with more people
a) Fingerprint scan d) To avoid using passwords
b) Eye-based recognition
c) Facial recognition 22. How does encryption protect data?
d) Typing a password a) It speeds up data transfer
b) It scrambles data into unreadable text
16. What does multi-factor authentication (MFA) c) It deletes unnecessary files
require? d) It saves space on your computer
a) One method of verification
b) Two or more methods of verification 23. What should you do to protect your personal
c) Only a password information online?
d) A username a) Use the same password everywhere
b) Avoid sharing it on unknown websites
17. Which of these is an example of MFA? c) Write your password on paper
a) Using a password only d) Ignore suspicious messages
b) Using a password and a fingerprint
c) Using your username 24. What is network traffic?
d) Answering a security question a) Cars on a road
b) Data being sent and received over a
18. Why is facial recognition considered secure? network
a) It is faster than typing a password c) A program that blocks ads
b) Each person’s facial features are unique d) A type of virus
c) It doesn’t require any hardware
d) It works without electricity 25. Why should you avoid using public Wi-Fi for
sensitive transactions?
19. What is an example of eye-based a) It costs too much money
authentication? b) Hackers can intercept your data
a) Retina scan c) It is too slow
b) Typing your name d) It doesn’t support passwords
c) Answering a question
d) Checking your email
Fill in the Blanks
1. A ______________________________________ is a secret word or phrase used to protect accounts.
2. Never share your ______________________________________ with anyone to keep your data safe.
3.___________________________________ is a type of harmful software that can steal or damage data.
4. To protect your computer from viruses, always install and update an __________________ software.
5. A strong password should contain letters, numbers, and ___________________________________.
Words Suggestion:
Password Malware Symbols Password Antivirus
Short Answer Questions
1. What are three things you can do to create a strong password?
Answer:
2. Why is it important to back up your data?
Answer:
3. Name two common cyber threats and how you can protect yourself from them.
Answer:
4. What is two-factor authentication (2FA), and how does it help keep your data safe?
Answe:
True/False Questions
1. It is safe to use the same password for all your accounts. (True/False)
2. Two-factor authentication adds extra security to your account. (True/False)
3. You should always click on unknown email links without checking. (True/False)
4. Keeping your software updated helps in protecting your data. (True/False)
5. Public Wi-Fi is always a safe option for online banking. (True/False)
Matching Words
Match the terms in Column A with their correct definitions in Column B.
Column A Column B
1. Antivirus Software A method of verifying a user’s identity
2. Phishing A program that helps detect and remove malware
3. Encryption A technique that converts data into unreadable form
4. Firewall A security system that blocks unauthorized access
5. Two-Factor Authentication A scam where someone pretends to be a trusted entity to steal
information
Answer:
Column A Column B