0% found this document useful (0 votes)
1K views3 pages

Satya Prakash Public School Class 7 Ch:10 Cyber Safety: A. Fill in The Blanks

This document provides information on various cyber safety topics like computer ethics, hacking, intellectual property, and cyberbullying. It includes fill-in-the-blank questions to test terms, true/false questions to check understanding, short answer questions about advantages of the internet and how to protect intellectual property, and definitions of concepts like plagiarism, spamming, cybercrime, firewalls and software piracy. The document aims to educate students on key issues in cyber safety.

Uploaded by

Namandeep Rajpal
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
1K views3 pages

Satya Prakash Public School Class 7 Ch:10 Cyber Safety: A. Fill in The Blanks

This document provides information on various cyber safety topics like computer ethics, hacking, intellectual property, and cyberbullying. It includes fill-in-the-blank questions to test terms, true/false questions to check understanding, short answer questions about advantages of the internet and how to protect intellectual property, and definitions of concepts like plagiarism, spamming, cybercrime, firewalls and software piracy. The document aims to educate students on key issues in cyber safety.

Uploaded by

Namandeep Rajpal
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

Satya Prakash Public School

Class 7th
Ch:10 Cyber Safety
A. Fill in the blanks :

1. Computer ethics
2. Citation
3. Cyber bulling
4. Hacking
5. Intellectual property

B. State True or false

1.Spam are unwanted bulk e-mail that come from strange sources. True

2. Hacking is the usage or imitation of the language and thoughts of another person and
projecting them as ons’s own original work. False

3. you can identify the unsecured websites by looking at the lock sign or https on the address bar.
True

4. Encryption is the process of transforming data into an unreadable code. True

5. A patent grants the inventor the sole right to make , use and sell that invention for an unlimited
period. False.

C. Application Based questions

1. To check To: or CC: field in the email address.


2. The unsecured websites by looking at the lock sign or https on the address bar.

D. MCQs

1. Spams
2. Cookies
3. Copyright
4. Encryption
5. Phishing

E. Answer the following questions

Q1. What are the advantages of the internet?


Advantages of the Internet are :

1) Communication Forum. One of the top benefits of the internet is


communication. Internet technology has allowed people and businesses to communicate
2) Abundant Information.
3) Inexhaustible Education.
4) Entertainment for Everyone.
5) Online Services.

Q2. Write any four ethical guide line which should be followed while using a computer?

A. Four ethical guide line which should be followed while using a computer are:

1) Do not spy on another persons computer.

2)Do not contribute to spread of wrong information.

3)do not claim ownership on a work which is the output of someone else intellect.

4)Avoid buying pirated software.

Q3 Define Plagiarism ? write a steps can be taken to prevent it.

A. Plagiarism is presenting someone else’s work or ideas as your own,

or

The practice of taking someone else's work or ideas and passing them off as one's own:

write a steps can be taken to prevent it are :

1. Keep track of the sources you consult in your research.


2. Paraphrase or quote from your sources (and add your own ideas).
3. Credit the original author in an in-text citation and reference list.
4. Use a plagiarism checker before you submit.

Q4. How can you protect your intellectual property right from getting violated?

Here are five different ways to protect your intellectual property.

1. Register copyrights, trademarks, and patents

2. Register business, product or domain names

3. Create confidentiality, non-disclosure or licensing contracts for employees and partners

4. Implement security measures :These may include:

• setting up password protection for all computer networks


• encrypting data, especially since files are shared within the company’s IT system
• using virtual private network access (VPN)
• establishing Wi-Fi Protected Access 2 (WPA2)
5. Avoid joint ownership

Q5. Why Software Piracy is a danger?


Why Software Piracy is a danger because:
• Many times it fails or malfunction.
• No warranty of the product as it is acquired by illegal way.
• Risk of security issues.
• No upgrade and improvement in features and functionality
• High risk of virus and malware infection to the computer.

F.. Write a short note on

• Spamming: Spamming is the use of messaging systems to send multiple unsolicited messages
(spam) to large numbers of recipients for the purpose of commercial advertising, for the purpose
of non-commercial proselytizing, for any prohibited purpose (especially the fraudulent purpose
of phishing), or simply sending the same message over and over to the same user.
• Cybercrime : Any offenses committed against individuals or groups of individuals to harm the
reputation or cause physical or mental trauma through electronic means can be defined as
Cybercrime.
• Firewall: A firewall is a network security device that monitors incoming and outgoing network
traffic and decides whether to allow or block specific traffic based on a defined set of security
rules. An early type of firewall device, a proxy firewall serves as the gateway from one network
to another for a specific application.
• Software Piracy : Software Piracy is the illegal approach of copying, distributing, modifying,
selling, or using the software which is legally protected. So in a simple term, we can say
Software piracy is the act of stealing legal software in an illegal way. This software piracy
refers to the unauthorized copy and use of legal software.
• Softlifting-
It is the most common type of software piracy. In this piracy, the legal owner of the software is
one, but the users are multiple. For instance, someone purchases the genuine software, and
others will illegally use that software by downloading the software to their computer.
• Hacking: Hacking is refers to illegal intrusion into a computer system or network.
• Phishing: Phishing is an act of sending an email to a user, misleading him to believe that it is
form a trusted person or organization , in an attempt to obtain sensitive information for malicious
purpose.

You might also like