Unit 7: Cyber Security – Class 10 English Guide
![]() |
Cyber Security Class 10 English Guide/Note. |
SEE Class 10 Compulsory English | All Units Notes:
- Unit-1 | Current Affairs and Issues | Class 10 | English | Guide.
- Unit-2 | Festivals and Celebrations | Class 10 | English | Guide.
- Unit-3 | Health and Wellness | Class 10 | English | Guide.
- Unit-4 | Work and Leisure | Class 10 | English | Guide.
- Unit-5 | Science and Experiment | Class 10 | English | Guide.
- Unit-6 | Food and Cuisine | Class 10 | English | Guide.
- Unit-7 | Cyber Security | Class 10 | English | Guide.
- Unit-8 | Hobbies and Interests | Class 10 | English | Guide.
- Unit-9 | History and Culture | Class 10 | English | Guide.
- Unit-10 | Games and Sports | Class 10 | English | Guide.
- Unit-11 | Ethics and Morality | Class 10 | English | Guide.
- Unit-12 | Nature and Development | Class 10 | English | Guide.
- Unit-13 | Population and Migration | Class 10 | English | Guide.
- Unit-14 | Travel and Adventure | Class 10 | English | Guide.
- Unit-15 | People and Places | Class 10 | English | Guide.
- Unit-16 | Success and Celebration | Class 10 | English | Guide.
- Unit-17 | Countries and Towns | Class 10 | English | Guide.
- Unit-18 | Media and Entertainment | Class 10 | English | Guide.
View All SEE Class 10 Compulsory English Notes:
SEE Class 10 Compulsory English | All Units Notes and Question Papers Collection.
Cyber Security
Reading I
Parents
The first reading text in this Unit 7: Cyber Security – Class 10 English is a short story entitled ‘Parents’ adopted from Vishnu Singh Rai's Martyr and Other Stories. The reading text delves into a contemporary issue of online interactions, particularly in the context of social media and internet friendships. The narrative revolves around Anuja, a 13-year-old girl, and her father, exploring the challenges and dangers associated with online relationships. The story raises crucial questions about online safety, identity deception, and the potential consequences of innocence in the digital age.
A. Choose the words/phrases given below and write against the correct definitions.
[munching, ridiculous, window shopping, stammer, obsessed, lurking, outfit, leer, swerve, stamp]Answer:
b. preoccupied with something continually to a troubling extent - obsessed
c. the act of looking at goods displayed in shop windows without intending to buy them - window shopping
d. bringing down one's feet heavily down on the ground - stamp (stamping)
e. deserving or inviting disapproval; absurd - ridiculous
f. a set of clothes worn for a particular occasion or activity - outfit
g. to turn aside abruptly from a straight line or course - swerve
h. eating something hard, steadily and noisily - munching
i. look or gaze in an unpleasant and offensive way - leer
j. speaking with difficulty, repeating sounds or words and often stopping - stammer
B. Rewrite the following sentences in chronological order.
a. Her father accompanied her to meet the friend.
b. They saw a car on the other side of the road.
c. Anuja told her father that she wanted to see her new friend.
d. She revealed her secret e-identity to her father.
e. She told her father about her new e-friend.
f. Anuja's father shared the incident with his friend.
g. He observed that Anuja was looking like a boy in her new dress.
h. They waited for Anuja's friend for ten minutes.
Answer:
⑧ - f. Anuja's father shared the incident with his friend.
C. Read the story again and answer these questions.
a. Why do you think Anuja was unwilling to take her father along with her to meet her new friend?
Answer: Anuja was unwilling to take her father along because she was afraid that her father will know her secret of chatting with her online friend as a boy.
b. How does she criticise her father?
Answer: Anuja criticizes her father by calling him obsessed and overprotective.
c. Describe Anuja's e-friend.
Answer: Anuja's e-friend is a 12-year-old girl with whom Anuja has been chatting online.
d. What (Why) did Anuja's father propose to go with her?
Answer: Anuja's father proposed to go with her because he wanted to meet her friend and make sure that she was safe.
e. What was the shocking news for her father?
Answer: The shocking news for her father was when Anuja revealed she had been chatting with her e-friend pretending to be a boy.
f. Why did they return without meeting Anuja's friend?
Answer: They returned without meeting Anuja's friend because they thought the friend didn’t come to the meeting place.
g. Why do you think Dhurva laughed at the story of Anuja's father?
Answer: Dhurba laughed at the story of Anuja's father because he knew that Anuja’s mother had seen the narrator. She thought that a man with a big stomach and a bald head was lurking around with bad intentions.
h. How did the girl's mother see Anuja's father?
Answer: The girl’s mother saw Anuja’s father from her car. They didn’t talk to each other because both the girls did not come out of the car and the parents had a misunderstanding of the situation.
D. What can be the consequences of faking your identities and bullying other people on social media and the internet?
Faking your identity and bullying others on social media and the internet can have serious consequences. Some of these consequences include:
③ Thirdly, it can lead to legal trouble. Cyberbullying and identity theft are against the law in many places, and you could face punishments like fines or even jail time. So, it's important to always be kind and honest online and treat others with respect.
Grammar I
A. Read the sentences below and say whether the words in red are used to express advice, moral obligation or compulsion.
a. You should raise your voice against discrimination.
b. You must abide by the traffic rules while driving.
c. You ought to be fair in your judgement.
Answer:
c. You ought to be fair in your judgement. - moral obligation
B. Complete the sentences below with should, ought to or must. Use the negative forms where necessary.
Answer:
b. If you want to lose weight, you should exercise regularly.
c.
B: You should inform the police about it.
d.
B: It was great. You should go and see it.
e. We must not disrespect our nation at any cost.
f. You look ill. You should see a doctor.
g. In order to maintain healthy habits, we should go to bed early and get up early in the morning.
h. You must not offend people with your harsh words.
i. We ought to learn to apologise with people to build trust and cooperation.
j. If you find someone's goods, you should try to return them to the respective person.
Writing I
A. Read the following email of invitation.
Subject: Invitation to the wedding of our brother
Cniti.thapaliya@gmail.com
Sambridhi
B. Imagine that you are Niti, and that you were unable to attend the function. Write a reply email to Sambridhi apologising for your inability to attend her brother's wedding due to an urgent family business.
From: nischalgurung@gmail.com
Subject: Apology for incapability to attend the wedding
Dear Sambridhi,
Warm regards,
Nischal Gurung
Reading II
Cyber Security: Basic Internet Safety Tips
The second reading text of this 7 Cyber Security – Class 10 English is an essay entitled ‘Cyber Security: Basic Internet Safety Tips”. The reading text explores essential strategies for safeguarding our online identity and privacy, as well as the precautions we should take while using the internet. In the age where our lives are intertwined with the internet, it's crucial to understand how to protect our personal information and stay safe online.
A. Match the words given below with their meanings.
a. possession | i. to prevent something bad from happening |
b. intertwined | ii. quick to detect or respond to slight changes or signals |
c. integration | iii. an act of buying or selling; deal |
d. avoid | iv. protecting something from danger or harm |
e. sensitive | v. something that you own or have with you; belongingness |
f. proliferated | vi. the act of proving that something is real or true |
g. shielding | vii. the act of combining two or more things together |
h. promptly | viii. closely connected with somebody or something |
i. authentication | ix. increased rapidly in number or amount |
j. transaction | x. without any delay |
Answer:
a. possession - v. something that you own or have with you; belongingness
b. intertwined - viii. closely connected with somebody or something
c. integration - vii. the act of combining two or more things together
d. avoid - i. to prevent something bad from happening
e. sensitive - ii. quick to detect or respond to slight changes or signals
f. proliferated - ix. increased rapidly in number or amount
g. shielding - iv. protecting something from danger or harm
h. promptly - x. without any delay
i. authentication - vi. the act of proving that something is real or true
j. transaction - iii. an act of buying or selling; deal
B. State whether the following statements are true or false.
a. It is a good idea to use the same password in different accounts for safety purposes. - False
b. The teenagers are more vulnerable than any other age group regarding internet safety. - False
c. It is not safe to let the computer remember our passwords. - True
d. A cheap debit card is safer than the expensive one. - False
e. It is not safe to enable auto update of software in our devices. - False
f. We should never enter our financial details on websites. - True
C. Read the following paragraph headings and write the correct paragraph name (A-H) against them.
a. Keep your Personal Data Safe
b. Keep Personal Information Private
c. Set up Two-factor Authentication
d. Make sure your Devices are Secure
e. Be Careful about WiFi
f. Pay Attention to Software Updates
g. Back up your Personal Data
h. Protect your Personal Information with Strong Passwords
Answer:
Paragraph H - Back Up Your Personal Data
D. Answer these questions.
a. How do we try to protect our physical property?
Answer: To protect our physical property, we can take several measures such as using locks, alarms, security cameras, security guards, and insurance.
b. What should we do to keep our passwords secret?
Answer: To keep our passwords secret, we should use different combinations for different accounts, avoid sharing passwords with others, and store them securely.
c. Mention any two safety measures for shopping with debit cards.
Answer: The two safety measures for shopping with debit cards are -
i) Shielding the PIN pad while purchasing with debit cards.
ii) Using a chip debit card.
d. How can we secure our accounts even when someone finds our password?.
Answer: We can secure our accounts even when someone finds out password by enabling two-factor authentication, which adds an extra layer of security beyond the password.
e. Why do you think we should make online friends only to familiar people?
Answer: We should make online friends only with familiar people to minimize the risk of interacting with strangers who may have malicious intentions or misuse our personal information.
g. What can we do to keep our online data safe?
Answer: To keep our online data safe, we should avoid connecting to unsecured public WiFi networks, surf only through secure websites, regularly update software, and utilize strong passwords and other security options like two-factor authentication.
E. Have you ever lost your personal data and information while using the internet? Share your experiences in the class.
Answer:
It is important to remember that sharing personal experiences related to online data loss or breaches can be sensitive and may vary from person to person. It is advisable to approach such discussions with empathy and respect for everyone's privacy.
Listening
B. Tick (✔) the internet safety measure if it is mentioned in the audio. If not, put a cross (X).
a. | Make sure your internet connection is secure. | x |
b. | Make sure that the computer has a Firewall and Antivirus working. | ✓ |
c. | Always use a strong email password. | x |
d. | Do not share your password with anyone, except your parents. | ✓ |
e. | Do not save your password on any devices. | ✓ |
f. | Close unused internet accounts. | x |
g. | Be careful about where you click while using the internet. | ✓ |
h. | Be careful about what you post from cyber cafes. | x |
i. | Inform your parents if you find violent content in the webpage. | ✓ |
C. Answer these questions in not more than four words.
a. What does the internet allow us to do?
Answer: The internet allows us to do many things.
b. What protects a computer from virus attack?
Answer: Firewall and Antivirus protects a computer from virus attack.
c. What should you do after using the email?
Answer: We should log out or shut down after using the email.
d. Why should we not click on ads or links?
Answer: We should not click on ads or links because they may contain viruses.
e. Whom should we consult for any internet-related problem in the cyber cafe?
Answer: We should consult with the supervisor for any internet-related problem in the cyber cafe.
D. Share a problem that you have faced while using the internet. How did you solve it?
Answer:
I was browsing the internet in a cybercafé near my home when I accidentally clicked on an inappropriate link. I immediately closed the browser to stop the content from loading further. Then, I approached a supervisor for help. I explained what happened and asked for guidance on how to avoid such situations in the future. The supervisor provided advice on being more cautious while browsing and avoiding suspicious links. They also suggested installing ad blockers and parental controls for additional protection. This experience taught me to be more vigilant online and seek help when needed.
Grammar II
A. Complete the sentences below with articles a or an.
Answer:
Patient: I have a fever and I feel dizzy.
b. Would you like to be an actor in the future?
c. What a lovely garden you have!
d. We spent half an hour in complete silence.
e. Please keep an eye on our house while we are away.
f. Mr. Napit has brought a ewe in his farm.
g. Ms Sharma's opinion was criticised as having a one-dimensional perspective.
h. We had to catch an early bus to be here on time.
B. Fill in the gaps in the sentences below with a, an or the.
Answer:
a. Could you open the window, please?
b. Did you read the book I gave you last week?
d. All the desks were full. So we had to sit on the floor.
e. Can you play the flute well?
f. You have a lovely house. I am particularly impressed by the living room.
g. The President is elected every five years in Nepal.
h. Do you think that the tourist is from Japan? No, she looks like a European.
i. This is the biggest fish I have ever caught in my life.
h. Bhartmani is known to be a man of action.
C. Fill in the blanks with the correct articles. If no article is used, put a th the correct articles. If no ar cross (X).
Answer:
b. What time did you get X home yesterday?
c. The Netherlands consists of twelve provinces.
d. X Everest is the pride of our country.
e. The Nile is the longest river in Africa.
f. X New Road is a financial hub in Kathmandu.
g. X Aarohan Gurukul Theater was founded in 1982.
h. What did you have for X breakfast this morning?
i. Braille system was developed to help the blind for reading and writing, j. Do you always play X badminton at school?
j. Do you always play X badminton at school?
Writing II
Write a newspaper article on "Internet and Cyber Security". Use the following guidelines in your article.
Introduction to the internet and technology
Use of the internet in our daily lives
The abuses of the internet
Need and ways of data privacy
Conclusion
Internet and Cyber Security
By Nischal Gurung, May 12
In the modern era, the internet and technology have become an integral part of our daily lives. With the rise of digitalization, we rely on the internet for communication, shopping, banking, entertainment, and more. However, along with its benefits, the internet has also brought a number of security concerns.
The internet is a vast network that is prone to abuse. Cybercriminals and hackers use various tactics to gain access to personal information, steal identities, and disrupt systems. These abuses can have a significant impact on individuals, organisations, and society as a whole.
It is essential to prioritize data privacy and take measures to safeguard our digital lives. Data privacy refers to the protection of personal information and ensuring that it is not accessed, used, or shared without authorization. This can be achieved through various means, such as using strong passwords, installing antivirus software, and being mindful of the information that is shared online.
Moreover, it is crucial to be aware of the various tactics used by cybercriminals and hackers, such as phishing, malware, and social engineering. Phishing involves the use of fraudulent emails or websites to trick individuals into sharing sensitive information, while malware refers to malicious software that can infect systems and steal data. Social engineering involves the manipulation of individuals to gain access to sensitive information.
In conclusion, the internet has revolutionized the way we live our lives, but it also brings with it a host of security concerns. We must take measures to protect our personal information and be aware of the tactics used by cybercriminals and hackers. By prioritizing data privacy, we can safeguard our digital lives and ensure that the internet remains a safe and secure place for everyone.
Internet and Cyber Security
By Nischal Gurung, May 12
In the end, the internet is a great tool, but we need to be cautious. By understanding the internet and cybersecurity, we can enjoy all the good things it offers while staying safe from the bad stuff. Let's all work together to make the Internet a safer place for everyone!
Suggestions and/or questions are always welcome, either post them in the comment form or send me an email at drgurung82@gmail.com.
However, comments are always reviewed and it may take some time to appear. Always keep in mind "URL without nofollow tag" will consider as a spam. 😜