Computer Applications
Case Study 2
Hari receives a call for verification of his bank account details. He receives a link and he fills up his account details in the form available on clicking the link. Soon he gets an OTP which he is asked to give to the caller. After some time, he is surprised to get a message from his bank that Rs. 40,000 has been deducted from his bank account for an online transaction. He realises he has been cheated.
Based on the given information, answer the questions given below. Attempt any four questions.
a. Name the above mentioned type of theft in which Hari's personal information was stolen.
b. State the mistakes Hari made, which lead to his financial loss.
c. Write two safety measures to be taken by Hari to avoid repeating such mistakes in the future.
d. Apart from the bank account details, what is the other type of data that can be stolen by imposters on the internet?
e. Write in brief about any one type of cyber crime, other than the above, that you are aware of.
Answer
a. Hari has been a victim of phishing.
b. The mistakes made by Hari include the following:
- He clicked on an unverified link.
- He did not check if the URL was secure i.e., had an 'https' in the web address.
- He provided personal and sensitive information (bank account details) on an unsecured form
- He shared the received OTP with the unknown caller.
c. Two safety measures Hari can take to avoid such mistakes in the future are:
- Engage in safe web browsing — Do not open any link from unknown sources or any pop up that appears. Both could be spyware used to plant tracking cookies on our machine, which can steal our information, direct us to bogus phishing sites, and pound us with pop-ups.
- Avoid sharing personal and sensitive information over phone call — Never share sensitive information such as OTP, bank account details, credit card numbers, usernames, passwords, etc. over a phone call with an unverified caller.
d. Apart from bank account details, other types of data that can be stolen are credit card numbers, usernames, passwords, aadhaar numbers, etc.
e. Another type of cyber crime is cyber stalking. It refers to online stalking where someone uses Internet, chat rooms, social networking sites, emails etc. to stalk his/her victim. Cyber stalker follows the victim online everywhere and keeps posting/sending something which are unsolicited.
Related Questions
Shobha recently got a printer as a gift. She has connected the printer to her computer as well as to the power source. Everything seems to be in order but when she tries to print, the printer does not show up in her list of devices. What could be the problem? Can you suggest what Shobha can do to resolve this issue?
Study the spreadsheet given below and write the solutions for the specifications that follow. You can write the answers for any four specifications out of the given five.

Specification 1: Write the formula to be entered in cell H4 in order to calculate Rita's total marks out of 500. How can you easily enter the formula for totals in the four cells (H5 to H8) without typing each individually?
Specification 2: The percentage column should contain the percentage of each student. Write the formula to be entered in cell I4 to calculate the percentage for the first student.
Specification 3: Write the formula that will appear in cell I5 when we copy the formula from cell I4 to cell I5.
Specification 4: Write the formula that should be entered in cell C9 to calculate the average marks in English.
Specification 5: If a column chart is to be plotted of students name against the marks in English, write the range of cells that needs to be selected.
Study the Excel chart shown below and write the solutions for the specifications shown below it. You can write the solutions for any four specifications out of the given five:

Specification 1: Name the type of chart that has been used in the figure. What is the type of analysis that this type is giving?
Specification 2: What is the temperature in Sydney in the month of November?
Specification 3: Which is the hottest city in the month of August?
Specification 4: Which is the country which generally has the lowest temperatures across the year?
Specification 5: What is the use of charts in a spreadsheet? Name one more type of chart.
Case Study 1
Neeta has to create a presentation for a project on sustainable development. She is not very familiar with digital presentation software. Help her understand some of the concepts with reference to a slide presentation.
- Presentation
- Creating a slide
- Workspace Views - any two views
- Animations
- Slide Layout