0% found this document useful (0 votes)
228 views

Class 7 Chapter-4

Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
228 views

Class 7 Chapter-4

Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

LESSON:-4 Ethics and safety measures in computing

Back Exercise:

Ex- A Fill in the Blanks


1) Computing a set of procedures, moral principles and ethical practices that regulates the
use of computer.
2) The simplest way to present plagiarism is the citation.
3) Cyberbullying is an act of harming, harassing, or targeting a person by another person
using internet a deliberate manner.
4) An illegal intrusion into a computer system or network is known as Hacking.
5) Intellectual property is a term referring to the legal property rights of a person over
his/her creations of mind, both artistic and commercial.

Ex- B State True or False:


1) Spam are unwanted bulk e-mails that come from strange sources. True.
2) Hacking is the usage or imitation of the language and thoughts of another person and
projected them as one’s own original work. False
3) You can identify the unsecured websites by looking at the green lock sign or https on the
address bar. False.
4) A digital footprint is also known as digital dossier. True.
5) A patent grants the inventor the sole right to make, use, and sell that invention for an
unlimited period. False.

Ex- D Multiple Choice questions:


1) The unwanted bulk e-mails that come from strange sources are called as Spam.
2) Cookie is a small text file stored on your computer’s browser directory that collects the
information of your online activity and reports back to the host.
3) A Copyright is a legal right granted by law to the creator for his original work.
4) Encryption is the process of transforming data into an unreadable code.
5) Phishing is an act of sending an e-mail to a user misleading him to believe that it is from
a trusted person or organisation.

ONE WORD/ONE SENTENCE QUESTIONS:- [1 MARK EACH]

Q1. What is Internet?


Ans. Internet is one of the largest information databases.
Q2. Define Plagiarism.
Ans: It is the usage or imitation of the language and thoughts of another person and projected as
one’s own original work
Q3.What do you mean by cyberbullying?
Ans It is an act of harming, harassing or targeting a person by another person using internet , in
a deliberate manner.
Q4. What are spams?
Ans: Spams are unwanted bulk e-mails that come from strange sources.
Q5. What is Hacking?
Ans: It refers to an illegal intrusion into a computer system or network.
Q6. What do you mean by software piracy?
Ans: When software is copied and distributed illegally, it is called Software privacy.
Q7. Define Phishing.
Ans: It is an act of sending an e-mail to a user, misleading him to believe that it is from a
trusted person or organisation.

SHORT QUESTIONS:- [2 MARKS EACH]

LESSON:-4 Ethics and safety measures in computing

Q1.Explain Intellectual Property Rights?


Ans: Intellectual Property is a term referring to the legal property rights of a person over his/her
creations of mind, both artistic and commercial.

Q2. Write down any four ethical guidelines which should be followed while using computer
and internet.
Ans. 1) Minors should always surf internet under the supervision of their parents.
2) Parents should decide and suggest age appropriate websites to their children.
3) To minimize the chances of the attack of hackers and crackers, one should use strong
password.
4) Taking regular data backups is the primary and the most reliable method of data protection.

Q3. Explain categories of Digital Footprint?


Ans: Digital footprints can be categorized into Active and Passive data traces.
1) Active data traces: The active ones are those data traces which the user leaves
intentionally. For ex: E-mail, Facebook and chats.
2) Passive data traces: Passive data traces, connected to an individual, are generated by
others or gathered through the user’s online activities without his knowledge.

Q4. Write steps to prevent Hacking.


Ans: 1) Keep your passwords secret and change them periodically. 2) Update your operating
systems and other software like anti-virus, frequently. 3) Avoid using open wi-fi as it makes for
hackers to steal the information and download inappropriate content. 4)Always make use of
secure websites by looking at the green lock sign or https on the address bar.

You might also like