Informatics Practices
Angad receives an SMS, shown alongside, from his bank querying a recent transaction. Answer the following questions as to what he should do in such a situation:
(a) Should he SMS his pin number to the given contact number?
(b) Should he call the bank helpline number to recheck the validity of the SMS received?

Computing Safety & Ethics
1 Like
Answer
(a) No, he should not SMS his PIN number to the given contact number. Sharing PIN numbers over SMS can lead to fraud and unauthorized access to his bank account, increasing the chance of his account being hacked, which can result in financial loss.
(b) Yes, he should call the bank helpline number to verify the validity of the SMS received. This ensures he is speaking directly to a legitimate bank representative and can confirm whether the transaction is genuine or if the SMS is a phishing attempt.
Answered By
2 Likes
Related Questions
Assertion (A): Hacking is compromising security on digital devices.
Reasoning (R): Hacking involves stealing passwords and other digital information.
- Both A and R are true and R is the correct explanation of A.
- Both A and R are true but R is not the correct explanation of A.
- A is true but R is false.
- A is false but R is true.
Jeet has to prepare a project on 'Swachh Bharat Abhiyan'. He decides to gather information from the internet. He downloads three web pages (webpage 1, webpage 2, webpage 3) containing information on Swachh Bharat Mission. Which of the following steps taken by Jeet is/are an example of plagiarism or copyright infringement? Give justification in support of your answer.
(a) He read a paragraph on 'Swachh Bharat Abhiyan' from webpage 1 and rephrased it. He finally pasted the rephrased paragraph in his project.
(b) He downloaded three images of 'Swachh Bharat Abhiyan' from webpage 2. He made a collage for his project using these images.
(c) He downloaded 'Swachh Bharat Abhiyan' icon from webpage 3 and pasted it on the front page of his project report.
Munish has topped in all the subjects in his school exams. His father has gifted him a laptop. He would like to make Munish aware of the health hazards associated with inappropriate and excessive use of laptop. Help his father list the points which he should discuss with Munish.
Jayati Chatterjee is studying digital footprints. Help her clarify the concepts of digital footprints.
(i) Digital footprints are also known as:
- Digital data
- Digital tattoos
- Plagiarism
- Digital print
(ii) Digital footprints are stored
- Temporarily (for a few days)
- For 7 days only
- Permanently
- For 3 days only
(iii) Whenever we surf the internet using smartphones, we leave behind a trail of data reflecting the activities performed by us online, which is termed as …………… .
- Digital footprint
- Online handprint
- Digital activities
- Internet activities
(iv) There are …………… kinds of digital footprints.
- 1
- 3
- 2
- 4
(v) Which is the correct type(s) of digital footprint?
- Active digital footprint
- Passive digital footprint
- Both (1) and (2)
- None of these