Saturday, January 3, 2026

3. Block Programming

 

3. Block Programming

DOWNLOAD PDF FILE





3.1 Concept of block programming 

 3.2 Introduction to Scratch: Features, Interface, Blocks 

 3.3 Components of Scratch: Control, Events, Motion, Operator, Variables and Sounds 

 3.4 Concept of Microbit: Micro Controller, Physical computing, sensors, LED Matrix 

 3.5 Concept of Arduino and UNO (universal Microcontroller coding)




3.1 Concept of Block Programming

 

Block programming is a simple and visual method of programming used to learn coding.

The word “block” refers to puzzle-like graphical pieces that fit together to form a program, while “programming” means giving instructions to a computer or electronic device to perform specific tasks. When combined, block programming involves arranging these blocks as instructions to tell the computer what to do.

It is a user-friendly approach, especially suitable for beginners and children.

Block programming is widely used to teach the basic concepts of programming by using colorful graphical blocks to create computer programs, games, videos, and animations.

It supports graphics, animation, and sound without requiring knowledge of complex text-based programming languages.

Common examples of block programming platforms include Scratch, Blockly, and Snap.

 

Advantages of Block Programming

a) Users do not need to worry about syntax or grammar as in other programming languages.

b) Users can focus more on creativity, logical thinking, and problem-solving skills.

c) The chances of human typing errors are very low since users do not need to write code manually.

d) Block programming is colorful, visually appealing, and engaging, especially for beginners and children.

e) It provides an interactive learning platform that helps users easily shift to text-based programming languages in the future.

 

Applications of Block Programming

 

a) Educational Purpose

Block programming is widely used in schools and educational programs to teach basic coding concepts. Its visual and interactive approach makes programming easy and interesting for beginners. It helps students develop a strong foundation in programming and prepares them to transition to text-based programming languages in the future.

 

b) Game Development

Block programming is used to develop simple games. Users can create characters, add game elements, and design game logic using blocks. This allows learners to focus on gameplay logic and creativity without dealing with complex coding syntax.

 

c) Mobile App Development

Block programming can also be used to create mobile applications. Users can design user interfaces, define app functions, and combine different blocks to develop Android and iOS applications without advanced programming knowledge.

 

d) Robotics

Block programming is widely used in robotics to program robotic devices. Its visual programming tools allow users to design robot movements, define behaviors, and control sensors easily. Devices such as micro:bit and Arduino UNO can be programmed using block programming. This helps students learn robotics concepts, build creativity, and develop interest in experimenting with robotic projects.

 

e) Web Development

Block programming can be used to create interactive websites using a visual interface. Users can define web page elements, user interactions, and basic data handling through blocks. This visual approach helps beginners understand web development concepts and acts as a bridge before learning text-based programming languages.

f) Creative Projects

Block programming is also used in creative fields such as animation and interactive storytelling. Artists and learners use platforms like Scratch and Blockly to create animations, stories, and creative digital projects. Many such projects have been developed using block programming platforms.

 

g) Modeling and Simulation

Modeling and simulation involve using logical or physical representations of a system to study behavior and make predictions. Block programming makes modeling and simulation easier by allowing users to define parameters, interactions, and scenarios using visual blocks.

 

h) Data Science and Visualization

Block programming can be used in data science to design simple algorithms, organize data, and perform data analysis using a visual interface. The results of data analysis can be presented through interactive charts and graphs, making data easier to understand and visualize.

 

3.2 Introduction to Scratch: Features, Interface, Blocks

 

Scratch is one of the most popular and widely used block-based programming languages, especially designed for beginners and children.

It was developed by the Lifelong Kindergarten Group at the MIT Media Lab.

Scratch is an open-source platform, meaning it is free and publicly available to everyone.

It has a large online community where users share projects and help each other.

The current version of Scratch is Scratch 3.0.

 

Scratch provides a colorful and interactive interface that allows users to create games, animations, stories, and interactive projects using visual blocks.

Although Scratch is fun and easy to use, it also helps users develop important skills such as logical thinking, problem-solving, and creativity, similar to professional programming.

Scratch can even be used to create advanced projects such as controlling robots or electronic devices.

 

Downloading Scratch on PC

Scratch can be downloaded and used on a personal computer by following these steps:

  1. Open a web browser such as Google Chrome or Microsoft Edge.
  2. Go to the official Scratch website: https://scratch.mit.edu
  3. Click on the Download option available on the website.
  4. Choose the version suitable for your operating system (Windows).
  5. Download the Scratch installer file.
  6. Open the downloaded file and follow the on-screen instructions to install Scratch.
  7. After installation is complete, open Scratch from the desktop or Start menu.

Once installed, Scratch can be used offline to create programs, games, and animations.

 

Using Scratch Online on PC

Scratch can be used online on a PC without installing any software by following these steps:

  1. Open a web browser such as Google Chrome, Microsoft Edge, or Firefox.
  2. Visit the official Scratch website: https://scratch.mit.edu
  3. Click on the Sign In option and log in using a Scratch account.
    • If you do not have an account, click Join Scratch to create one.
  4. After signing in, click on the Create button.
  5. The Scratch online editor will open, allowing you to create programs using block-based coding.
  6. You can save projects online and access them anytime by logging into your account.

Using Scratch online allows users to create, edit, and share projects easily without installing Scratch on the computer.

Scratch for Mobile

Scratch can also be used on mobile devices such as smartphones and tablets. Users can access Scratch through a mobile web browser by visiting the official Scratch website. However, the full Scratch editor works best on tablets and larger screens rather than small mobile phones.

 

For younger learners, ScratchJr is available as a mobile application for Android and iOS devices. ScratchJr is a simplified version of Scratch designed for children to learn basic programming concepts using visual blocks. It allows users to create simple stories, animations, and games by snapping blocks together.

Scratch for mobile helps learners practice programming concepts anytime and anywhere, making learning more flexible and accessible.

 

 

Features of Scratch

 

a) Drag-and-Drop Interface -

Scratch uses a drag-and-drop system where users create programs by assembling blocks instead of typing code.

b) Event-Driven Programming

Scratch programs can respond to events such as mouse clicks, key presses, or dragging objects.

c) Data and Variables

Scratch allows the use of variables to store, update, and manipulate data within a program.

d) Loops and Conditions

Loops and conditional blocks help control the flow of program execution easily.

e) Sounds and Music

Scratch supports adding sounds and music to make projects more interactive and engaging.

f) Community Sharing

Users can share their projects on the Scratch website, explore others’ creations, and collaborate with the global Scratch community.

 

Scratch Interface

Scratch has a colorful and user-friendly interface. Both the online and offline versions of Scratch have the same interface. The Scratch interface consists of the following main components:

  • Stage
    The stage is where the output of the program is displayed. Sprites perform actions on the stage when the green flag is clicked.
  • Sprite
    A sprite is any object or character in Scratch. By default, Scratch provides a cat sprite, which can be changed using the Choose a Sprite option.
  • Blocks Palette
    The blocks palette contains different types of programming blocks arranged by color and category, which are used to create programs.
  • Scripts Area
    The scripts area is where blocks are dragged and connected together to form a program.
  • Extensions Library
    This library allows users to add extra features such as Music, Pen, micro:bit, and other extensions to a Scratch project.
  • Costumes Tab
    The costumes tab is used to draw, edit, or change the appearance of a sprite.
  • Sounds Tab
    Reinforces projects by adding sound effects or music to sprites or the stage.
  • Sprite Info Pane
    This section shows all sprites used in the project and allows users to select and manage sprites.
  • File Tab
    Used to create new projects, open existing projects, and save work.
  • Choose a Sprite
    Allows users to select sprites from Scratch’s built-in library.
  • Choose a Backdrop
    Used to select or change the background image displayed on the stage.
  • Project Name
    Displays the name of the project, which can be edited by clicking on it.
  • Green Flag
    Acts as the play button to start running the program.
  • Backpack
    Used to store blocks, sprites, or scripts that can be reused in other projects.

 

Concept of Block

In block programming, blocks are colorful graphical units that represent actions or commands. These blocks are joined together using the drag-and-drop method to create a sequence of instructions for a program. This process is similar to playing with building blocks, where blocks are connected to form a complete structure.

Block-based coding is easy for beginners to understand because it does not require writing complex code. For example, to move a character or make it perform an action such as jumping, the required blocks are simply selected and connected. This approach encourages creativity and helps develop logical thinking and problem-solving skills.

 

3.3 Components of Scratch: Control, Events, Motion, Operator, Variables and Sounds

 

The block component of Scratch is one of its main features that makes it unique. Blocks are pre-programmed commands represented in the form of colorful graphical blocks. These blocks work like puzzle pieces that can be joined together using drag-and-drop to create programs. Each block has a specific function and helps control the behavior of sprites.

In Scratch, there are nine main types of blocks available in the Blocks Palette, grouped according to their functionality.

 

Types of Blocks in Scratch

 

1. Motion Blocks

Motion blocks are used to control the movement of a sprite on the stage. They help move, turn, glide, or change the position and direction of a sprite.
Example: move 10 steps, turn 15 degrees

 

2. Looks Blocks

Looks blocks are used to change the appearance of a sprite, such as its costume, size, color effects, or visibility.
Example: say "Hello!", change size by 10

 

3. Sound Blocks

Sound blocks are used to add sound effects and music to sprites and control volume.
Example: play sound meow, change volume by 10

 

4. Events Blocks

Events blocks are used to start scripts when a specific event occurs, such as clicking the green flag or pressing a key.
Example: when green flag clicked, when space key pressed

5. Control Blocks

Control blocks manage the flow of a program by using loops, delays, and conditions.
Example: repeat 10, if then

 

6. Sensing Blocks

Sensing blocks allow a sprite to detect interactions with other sprites, the mouse, keyboard, or environment.
Example: touching sprite?, mouse down?

 

7. Operators Blocks

Operators blocks are used to perform mathematical calculations and logical comparisons.
Example: +, <, and

 

8. Variables Blocks

Variables blocks are used to store, update, and display data values during program execution.
Example: set score to 0, change score by 1

 

9. My Blocks

My Blocks allow users to create custom blocks to organize code and reuse instructions easily.
Example: define jump

 

3.4 Concept of Micro:bit

The micro:bit (stylized as micro:bit) is a small programmable device, about the size of a calculator, used to create interactive projects such as games, flashlights, robots, and decorative lights like Tihar lights. It is a tiny computer designed to help learners understand how programming and hardware components work together.

Micro:bit is mainly used for learning and experimenting with physical computing, which refers to creating projects that interact with the real world using sensors, lights, buttons, and movement. It provides a simple and effective way for students to learn programming concepts while working with real electronic components.

 

History of Micro:bit

The micro:bit, also known as the BBC micro:bit, was developed to encourage young people to become creative with digital technology and improve their programming skills. It was introduced in 2015 as part of an educational initiative in the United Kingdom by the BBC (British Broadcasting Corporation).

The development of the micro:bit was a collaborative effort involving several organizations such as BBC, ARM, Microsoft, and other educational partners. The device was designed to be simple, affordable, and easy to use, so that students could learn coding and basic electronics in a practical, engaging, and motivating way.

 

Components of Micro:bit

 

The micro:bit contains various components that make physical computing possible. The main components of micro:bit are:

 

a) Microcontroller

The microcontroller is a tiny computer on the micro:bit board that runs programs and controls all other components to perform specific tasks.

 

b) 5×5 LED Matrix

The 5×5 LED matrix consists of 25 small LEDs used to display text, numbers, symbols, and simple animations.

 

c) Sensors

Micro:bit includes sensors such as light and temperature sensors that measure environmental conditions around the board.

 

d) Buttons

The micro:bit has two programmable buttons (Button A and Button B) that can be used to trigger actions when pressed.

 

e) Microphone

The microphone allows the micro:bit to detect and respond to sound or noise levels.

 

f) Pin Connector

Pin connectors are metal holes used to connect wires, external components, or other devices to the micro:bit for extended functionality.

 

g) Physical Computing Support

Micro:bit supports physical computing, which combines hardware (sensors, buttons, LEDs) and software to create interactive real-world projects such as robots, wearable devices, and smart systems.

 

Applications of Micro:bit

 

Micro:bit has many applications in different fields due to its small size, built-in sensors, LEDs, and wireless capabilities. Some major applications of micro:bit are:

 

a) Education

Micro:bit is widely used as an educational tool to provide hands-on learning in coding and electronics. Students can create interactive projects such as games, animations, and simple gadgets, which helps them understand programming and hardware concepts effectively.

 

b) Fitness

Micro:bit can be used to develop fitness-related projects that promote movement and exercise. Examples include step counters, fitness games, and workout trackers.

 

c) Games

Micro:bit is an ideal platform for creating simple games using buttons, sensors, and LEDs. Examples include rock–paper–scissors, maze games, and dice simulators.

 

d) Fashion

Micro:bit is used in fashion and wearable technology to add interactive elements to clothing and accessories. Designers use LEDs and sensors to create smart garments and wearable accessories.

 

e) Music

Micro:bit can be used to create interactive musical projects such as electronic instruments, sound effects, and beat generators. Projects like banana piano, voice recorder, and jukebox are common examples.

 

f) Cooking

Although micro:bit is not designed specifically for cooking, it can be creatively used for tasks such as digital egg timers, temperature monitoring, and displaying recipes.

 

g) Home and Garden

Micro:bit can be used to create smart home and gardening solutions such as temperature and humidity monitors, smart lighting systems, soil moisture monitoring, and automated watering systems.

3.5 Concept of Arduino UNO

While micro:bit is mainly suitable for beginners and educational purposes, Arduino UNO is preferred for a wider range of projects such as LED flashlights, robotic vehicles, temperature sensors, and many other electronic applications. Arduino UNO is one of the most common and widely used Arduino boards. It is a microcontroller-based development board used to learn and build real-world electronic projects.

 

History of Arduino UNO

The Arduino UNO platform was developed by David Cuartielles and Massimo Banzi in 2010. Their main objective was to provide students with an easy-to-use tool to learn programming and electronics together. Arduino UNO was designed to help learners apply theoretical knowledge to real-life projects and develop a practical understanding of programming and electronic systems.

 

Types of Components in Arduino UNO

The components of Arduino UNO are divided into hardware and software components.

 

a) Hardware Components

Arduino UNO consists of the following hardware parts:

  • ATmega328P microcontroller, which acts as the brain of the board
  • 14 digital input/output pins
  • 6 analog input pins
  • USB port for programming and power
  • Power jack
  • Reset button
  • Built-in LED
  • Crystal oscillator for clock signal
  • Voltage regulator for power control

 

b) Software Components

Arduino UNO uses a special software called the Arduino IDE (Integrated Development Environment). This software is used to write, compile, and upload programs to the Arduino board. Arduino IDE also supports libraries, which are ready-made sets of code that add extra functionality and make programming easier.

 

Applications of Arduino UNO

 

Arduino UNO is versatile and easy to use, so it is applied in many fields. Some major applications are:

 

a) Education

Arduino UNO is widely used in education to teach programming and electronics together through practical experiments.

 

b) Home Automation

It is used in home automation projects such as controlling lights, monitoring temperature, and managing household appliances.

 

c) Robotics

Arduino UNO is popular in robotics for controlling motors, sensors, and robotic systems.

 

d) Wearable Technology

Due to its small size, Arduino UNO is suitable for wearable devices such as digital watches, step counters, and smart accessories.

 

e) Data Gathering

Arduino UNO can collect data using sensors, making it useful for environmental monitoring, motion detection, and GPS tracking.

 

f) Gaming

Arduino UNO can be used to create simple games or gaming controllers by combining programming and electronics.

 

g) Audio Projects

It is used in audio-related projects such as music controllers, sound installations, and walking pianos.

 

h) Testing Products

Engineers and developers use Arduino UNO to test electronic circuits and prototypes before developing complex hardware products.

 

Micro:bit

Arduino UNO

Micro:bit is mainly designed for beginners and students.

Arduino UNO is used for beginners as well as advanced users.

It is small in size and simple to use.

It is slightly larger and more complex than micro:bit.

It supports block-based programming such as MakeCode and Scratch.

It mainly uses text-based programming (Arduino IDE using C/C++).

It has built-in components like LED matrix, buttons, sensors, and Bluetooth.

It requires external components like LEDs, sensors, and modules.

It is best for learning basic programming and physical computing.

It is suitable for real-world electronic and robotic projects.

Micro:bit is commonly used in schools for educational purposes.

Arduino UNO is widely used in industries, robotics, and prototyping.

It is easier to set up and start using.

It needs more wiring and circuit connections.

 

Micro:bit is ideal for beginners and educational learning, while Arduino UNO is better suited for advanced projects and real-world electronic applications.

6. Cyber Security and Digital Citizenship

 

6. Cyber Security and Digital Citizenship

 DOWNLOAD PDF LINK




6.1 Concepts of Cybersecurity 

 6.2 Concept of Cybercrime 

 6.3 Prevention methods for cyber crime 

 6.4 Safe web browsing techniques 

 6.5 Concept of Digital Citizen 

 6.6 Concept of Netiquette and online behaviors 

 6.7 Concept of digital footprint and privacy in online 



6.1. Concept of cybersecurity

Cybersecurity is the practice of protecting computer systems, networks, and digital information from theft, damage, unauthorized access, and cyberattacks.

Cyberattacks occur every day and can affect individuals, small businesses, and large organizations around the world. These attacks can cause serious data loss and financial damage. To stay protected, people and organizations use various methods such as network security, application security, information security, and operational security. Therefore, cybersecurity is essential to keep digital information safe from cyber threats.

 

Why is cybersecurity essential for individuals and businesses in Nepal?

Cybersecurity is essential in Nepal because the use of the internet, online banking, and digital services is increasing rapidly. It protects individuals’ personal data and finances from cyber crimes such as hacking and phishing. For businesses, it helps secure confidential data, prevent financial loss, and maintain customer trust.

 

How do your online activities impact your privacy and security?

Online activities affect privacy and security because sharing personal information, using weak passwords, or clicking unknown links can expose data to cyber attacks. Unsafe behavior may lead to hacking, data theft, or identity misuse. Safe practices help protect privacy and security.

 

What are the responsibilities of a digital citizen?

A digital citizen should protect personal and others’ data, follow cyber laws, and use the internet ethically. They should avoid cyber crimes, respect privacy, and communicate responsibly online. Practicing safe online behavior is also an important responsibility.

 

6.2. Concept of cybercrime

 

Cybercrime refers to criminal activities carried out using computers or the internet.

When computers are used for illegal purposes, they can harm people’s safety, privacy, and financial security. Cybercrime includes activities such as identity theft, phishing through fake emails, website attacks, data theft, installing malicious software without permission, and hijacking social media accounts.

In Nepal, cybercrime is regulated under the Electronic Transactions Act (ETA), 2063 B.S., which helps control cybercrime and enforce laws related to digital offenses.

 

6.3 Prevention methods from cybercrime

·       Use a strong password.

·       Multi-factor authentication (MFA)

·       Software updates

·       Authentication

·       Use of Firewall

 

Use a strong password.

 

A password is a set of alphanumeric characters used to verify a user’s identity.

Using strong and unique passwords helps protect digital data from cyber threats and unauthorized access. Passwords should be changed regularly and never shared to prevent misuse of personal information.

 

Passwords and usernames together are known as credentials, which are essential for accessing emails, websites, and financial accounts.

Keeping passwords secure helps prevent unauthorized access and misuse of personal information.

 

 

Tips to Ensure Passwords are Secure and Strong

a. Do not use simple sequences such as 1234 or abcd, as they are easy to guess.

b. Use a combination of uppercase and lowercase letters, numbers, and special symbols.

c. Avoid using dictionary words or common terms such as admin or password.

d. Use a longer password. It should be at least six characters, and longer passwords provide better security.

e. Do not reuse the same password for multiple accounts and avoid sharing passwords with others.

 

Multi-Factor Authentication (MFA)

Multi-factor authentication (MFA) is a security method that requires users to provide two or more forms of verification to access an online account or application.

It adds an extra layer of security, so even if a password is stolen, unauthorized users cannot easily access the account.

MFA may require a password along with a mobile phone, fingerprint, face scan, or other verification methods.

 

Types of Multi-Factor Authentication

  1. Something you know
    a. Password
    b. PIN
  2. Something you have
    a. Smartphone
    b. Security badge
  3. Something you are
    a. Biometrics such as fingerprint
    b. Voice recognition
    c. Retina scan

 

Software Updates

Keeping the operating system and applications up to date is very important for cybersecurity.

Regular software updates fix security vulnerabilities and protect systems from cyber attacks.

Enabling automatic updates helps prevent attacks that target outdated software.

 

Authentication

Authentication is the process of identifying a user, usually by using a username and password.

A strong authentication system helps ensure that only authorized users can access a computer system and prevents unauthorized access.

 

Use of Firewall

A firewall is a security tool that monitors and filters network traffic to block unauthorized access to a device or network.

It can be hardware-based, software-based, or built into an operating system such as Windows Firewall.

Using a firewall helps protect systems from unwanted internet traffic, viruses, and cyber attacks.

 

6.4 Safe Web Browsing Techniques

Safe web browsing techniques refer to the practices and methods used to browse the internet securely in order to protect users from cyber threats, malware, data theft, and unauthorized access.

Safe web browsing techniques help reduce cyber risks and protect users from online threats.

 

To prevent such attacks, here are some safe browsing techniques that help minimize cyber threats:

 

Use a Secure Connection

A secure connection is a private and encrypted communication between a user’s device and a server. Encryption prevents unauthorized users from viewing or altering data. A secure connection can be identified by a lock icon or https in the website address bar. Using a trusted Virtual Private Network (VPN) also helps protect user privacy while browsing the internet.

 

Use a Secure Browser

A secure browser helps protect user privacy and security while browsing the internet.

 It provides features such as private browsing, tracking protection, ad-blocking, and password management.

Examples of secure browsers include Mozilla Firefox, Google Chrome, Safari, Microsoft Edge, Opera, and Brave.

 

Use a Secure Search Engine

A secure search engine is a web-based tool that allows users to search for information on the internet while prioritizing privacy and security.

It may also filter harmful or inappropriate websites from search results.

Examples of secure search engines include Google, Bing, and DuckDuckGo.

 

Use Secure Websites

A secure website protects user privacy and data by using security features such as encryption and authentication.

A secure website can be identified by a lock icon or https in the address bar.

Checking the website’s privacy policy and user reviews also helps ensure that proper security measures are in place.

 

6.5 Concept of Digital Citizen

A digital citizen is a person who uses the Internet and digital technologies responsibly, safely, and ethically. A good digital citizen respects others online, protects personal information, avoids cyberbullying, follows laws, and uses technology to learn, communicate, and contribute positively to society.

Example: A student attending online classes, using social media politely, and following cybersecurity rules is a good digital citizen

 

To be a good digital citizen, consider following these guidelines:

  • Think Before You Post anything online to avoid hurting others or sharing harmful content.
  • Use the Internet and social media responsibly and respectfully.
  • Protect personal information such as passwords, addresses, and bank details.
  • Avoid cyberbullying, trolling, or spreading fake news.
  • Follow cyber laws and respect copyrights when using digital content.
  • Use strong passwords and update them regularly for online safety.
  • Report harmful or suspicious online activities to teachers, parents, or authorities.
  • Use digital tools for learning, communication, and positive contribution to society.

 

Digital Citizen

A digital citizen is a person who uses the internet and digital technologies responsibly and ethically. They actively participate in the digital world by creating, sharing, and using digital content in a safe and respectful manner.

 

Guidelines of a Good Digital Citizen

a. Think carefully before posting on social media and consider its impact.
b. Avoid sharing personal information to reduce the risk of identity theft.
c. Use multiple search engines to improve privacy and limit tracking.
d. Change passwords regularly to protect online accounts and data.
e. Report unlawful or inappropriate online activities to the concerned authorities.

 

 

6.6 Concept of Netiquette and Online Behaviors

Netiquette is a combination of the words network and etiquette and refers to the set of rules and guidelines for proper and respectful behavior on the internet.

Online behavior and internet ethics focus on using digital platforms responsibly and ethically in online communities.

Netiquette is important for both personal and professional use of the internet on platforms such as social media, online forums, and messaging apps.

Just like good manners are important in real life, respectful behavior is equally important in the online world. The basic principle of netiquette is to treat others online with respect.

 

Examples of Good Netiquette and Online Behavior

  1. Communicate respectfully with others online.
  2. Avoid using offensive or harmful language.
  3. Respect privacy and do not share personal information without permission.
  4. Avoid spamming or flooding messages.
  5. Give proper credit when sharing others’ work.
  6. Think carefully before posting or commenting online.
  7. Report abusive or inappropriate behavior.
  8. Be open to constructive criticism.
  9. Maintain a positive and responsible online presence.

 

6.7 Concept of Digital Footprint and Privacy Online

A digital footprint is the information record created by an individual’s online activities. These activities include web searches, social media usage, online shopping, emails, phone calls, and app usage.

A digital footprint is also known as a digital shadow or electronic footprint.

All online activities create digital data that can be used to track a person’s behavior and devices, which makes privacy an important concern in the digital world.

 

Types of Digital Footprints

I. Active Digital Footprint

An active digital footprint consists of information that a user knowingly and intentionally shares online. Since the user provides this information willingly, they are aware of the footprint being created.
Examples: social media posts, emails, comments, and phone calls.

 

II. Passive Digital Footprint

A passive digital footprint consists of information that is collected without the user’s direct knowledge. These footprints are harder to control and manage because they are often gathered automatically.
Examples: web searches, online shopping history, location data, website cookies, and fitness tracker data.

 

Online privacy refers to the protection of an individual’s personal information and communications on the internet. It involves safeguarding data from unauthorized access and misuse. Although digital technology offers many benefits, it also increases the risk of privacy breaches due to digital footprints.

 

Advantages of Digital Footprints

 

a. Health Monitoring
Smartwatches and health applications use digital footprints to track and analyze fitness and health data, helping in better health management.

b. Social Connections
Digital footprints help people connect and communicate with others through social networking platforms.

c. Targeted Advertising
Companies use browsing behavior to show relevant advertisements, which can improve customer engagement and sales.

d. Law Enforcement Support
Law enforcement agencies use digital footprints to assist in investigations, prevent crimes, and ensure public safety.

 

Disadvantages of Digital Footprints

 

a. Security Vulnerabilities
Digital footprints can expose users to security risks, leading to privacy breaches and identity theft.

b. Legal and Ethical Concerns
The use of digital footprints raises legal and ethical issues related to privacy rights and data protection.

c. Exploitative Business Practices
Some businesses misuse or sell user data without proper consent, raising concerns about fairness and ethics.

d. Cybercriminal Exploitation
Hackers can use digital footprint data to commit fraud and other cyber crimes.

e. Spying and Online Abuse
Digital footprints can be misused for spying, cyber harassment, and online abuse.

 

Steps to Protect Yourself from Digital Footprint Risks

 

a. Know Security Rules
Understand how websites and online services collect and use your personal information.

b. Update Privacy Settings
Adjust privacy settings on social media and apps to control who can see your data.

c. Secure Devices
Use strong and unique passwords for each account and enable multi-factor authentication.

d. Remove Old Accounts
Delete unused or inactive online accounts to reduce exposure of personal information.

e. Update Software
Keep devices and applications updated to fix security vulnerabilities.

f. Disable Location Tracking
Turn off location services when not required to prevent unnecessary tracking.

 

ii. Explain Cyber Law by relating it with the constitution.

Cyber law refers to the laws that regulate the use of computers, the internet, and digital activities. Like the constitution protects citizens’ rights and responsibilities, cyber law protects users’ digital rights, privacy, and security while controlling cyber crimes.

 

iii. What is a Firewall? Why is it different from antivirus software?

A firewall is a security system that monitors and controls incoming and outgoing network traffic to block unauthorized access. It is different from antivirus software because a firewall prevents unauthorized access, while antivirus software detects and removes viruses and malware from a system.

 

iv. You use digital devices on a daily basis. What do you know about digital society?

A digital society is a community where people use digital devices and the internet for communication, education, business, and social interaction. It relies on technology to share information and provide services efficiently.

 

 

 

a. Define malware and describe its types.

Malware (malicious software) refers to any software intentionally designed to damage computer systems, steal data, or disrupt normal operations without the user’s permission.

 

Types of Malware

  1. Virus
    A virus attaches itself to files or programs and spreads when the infected file is executed, causing damage to data and systems.
  2. Worm
    A worm spreads automatically through networks without user action and consumes system resources.
  3. Trojan Horse
    A trojan disguises itself as a legitimate program but secretly performs harmful actions such as stealing data.
  4. Spyware
    Spyware secretly monitors user activities and collects personal information without consent.
  5. Ransomware
    Ransomware locks files or systems and demands payment to restore access.

 

c. Explain the safe browsing techniques.

Safe browsing techniques are practices used to reduce cyber risks while using the internet.

  1. Use Secure Connections
    Always browse websites with https and a lock icon to ensure encrypted communication.
  2. Use Secure Browsers and Search Engines
    Secure browsers and search engines provide privacy protection and reduce tracking.
  3. Use Strong Passwords and Authentication
    Strong passwords and multi-factor authentication protect online accounts.
  4. Avoid Suspicious Links and Downloads
    Do not click unknown links or download files from untrusted sources.
  5. Keep Software Updated
    Regular updates fix security vulnerabilities and protect against attacks.

 

 


 

35 Higher-Ability MCQs (Section-wise, Tick the Answer)

1. Cybersecurity mainly focuses on protecting:

a. Hardware only        b. Software only         c. Systems, networks, and digital data    d. Internet speed

 

2. Which situation best represents cybersecurity?

a. Playing online games                                                          b. Using social media
c.
Preventing unauthorized access to data                     d. Downloading videos

 

3. Why is cybersecurity important for businesses?

a. For entertainment                           b. To protect customer data and trust
c. To increase advertising                   d. To reduce staff

 

4. Which is NOT a type of cybersecurity?

a. Network security    b. Application security    c. Information security   d. Hardware manufacturing

 

5. Cybersecurity failures mostly result in:

a. Faster internet                     b. Data loss and financial damage
c. More storage                       d. Software upgrades

 

6. Cybercrime is best defined as:

a. Online communication                                                       b. Software error
c.
Illegal activities using computers or internet             d. Internet addiction

 

7. Which is a cybercrime?

a. Software update      b. File backup             c. Identity theft     d. Online learning

 

8. Phishing mainly aims to:

a. Improve security                 b. Steal personal information
c. Block websites                    d. Speed up internet

 

9. Cybercrime in Nepal is controlled by:

a. Criminal Code                                                         b. Civil Code
c.
Electronic Transactions Act, 2063                   d. Copyright Act

 

10. Hijacking social media accounts is an example of:

a. Ethical hacking                   b. Cybercrime
c. Cybersecurity                     d. Authentication

 

11. The strongest password is:

a. ram123        b. password     c. 123456        d. R@9#Lm2

 

12. Multi-Factor Authentication improves security by:

a. Removing passwords                      b. Adding extra verification layers
c. Increasing speed                             d. Blocking websites

 

13. Which is “something you are” in MFA?

a. PIN              b. Smartphone            c. Fingerprint                    d. Password

 

14. Why are software updates important?

a. Add features                        b. Fix security vulnerabilities
c. Delete files                          d. Improve graphics

 

15. A firewall mainly helps to:

a. Remove malware                b. Block unauthorized network access
c. Store passwords                  d. Encrypt emails

 

16. A secure website can be identified by:

a. www            b. .com            c. https and lock icon                    d. Ads

 

17. VPN is mainly used to:

a. Increase download speed                b. Protect privacy and encrypt data
c. Remove viruses                              d. Store files

 

18. Which browser feature improves privacy?

a. Auto-play                b. Private browsing mode
c. Zoom                       d. Screenshot

 

19. Which search engine focuses more on privacy?

a. Google                                b. Bing
c.
DuckDuckGo                 d. Yahoo

 

20. Clicking unknown links may result in:

a. Faster browsing                  b. Malware infection
c. Software updates                d. Backup

 

21. A digital citizen is someone who:

a. Uses internet freely             b. Uses technology responsibly and ethically
c. Avoids technology              d. Breaks cyber laws

 

22. Which shows good digital citizenship?

a. Sharing fake news               b. Respecting others’ privacy
c. Cyberbullying                     d. Using weak passwords

 

23. Which action harms digital society?

a. Reporting abuse                  b. Spreading misinformation
c. Learning online                   d. Using secure passwords

 

24. A good digital citizen should:

a. Ignore cyber laws               b. Follow laws and ethical behavior
c. Share passwords                 d. Troll others

 

25. Digital society mainly depends on:

a. Paper records                      b. Digital devices and internet
c. Manual systems                  d. Postal services

 

26. Netiquette refers to:

a. Hardware rules                   b. Online behavior guidelines
c. Software design                  d. Network speed

 

27. Which is good netiquette?

a. Spamming                           b. Giving credit to others’ work
c. Offensive language             d. Sharing private data

 

28. Why is netiquette important?

a. For entertainment               b. To maintain respectful online communication
c. To increase followers                      d. To hack accounts

 

29. Which violates netiquette?

a. Respectful comments                     b. Cyberbullying
c. Reporting abuse                  d. Constructive feedback

 

30. The basic principle of netiquette is:

a. Be popular                          b. Treat others with respect
c. Post frequently                    d. Share opinions aggressively

 

31. Digital footprint means:

a. Internet speed                      b. Record of online activities
c. Computer virus                   d. Software license

 

32. Posting on social media creates:

a. Passive footprint                 b. Active digital footprint
c. No footprint                         d. Malware

 

33. Location tracking without knowledge is:

a. Active footprint                  b. Passive digital footprint
c. Cyber law                            d. Authentication

 

34. Which is an advantage of digital footprints?

a. Identity theft                       b. Health monitoring
c. Cyber fraud                         d. Privacy loss

 

35. Best way to reduce digital footprint risk is to:

a. Share more data                  b. Update privacy settings and use strong passwords
c. Ignore security                    d. Disable antivirus

 

1.     Define cybersecurity and explain its importance.

2.     Why is cybersecurity essential for individuals and businesses in Nepal?

3.     Define cybercrime and Explain the major types of cybercrime with examples.

4.     Explain various methods to prevent cybercrime.

5.     What is a strong password? Explain the tips to create secure passwords.

6.     Explain multi-factor authentication (MFA) and its importance.

7.     Why are software updates important for preventing cybercrime?

8.     Explain the role of authentication and firewall in cybersecurity.

9.     What are safe web browsing techniques? Explain with examples.

10.  What is a secure website? How can you identify it?

11.  What risks are involved in unsafe web browsing?

12.  Who is a digital citizen? Explain the qualities of a good digital citizen.

13.  Explain the responsibilities of a digital citizen.

14.  What is digital society? Explain its features.

15.  How can students become responsible digital citizens?

16.  Why is digital citizenship important in today’s society?

17.  Define netiquette and explain its importance.

18.  Explain the guidelines for good netiquette and online behavior.

19.  Why is respectful communication important in online platforms?

20.  What are the consequences of poor netiquette?

21.  How does netiquette help create a positive digital environment?

22.  Define digital footprint and explain its types.

23.  Explain the concept of online privacy.

24.  Write the advantages and disadvantages of digital footprints.

25.  Explain the steps to protect oneself from digital footprint risks.