Satya Prakash Public School Class 7 Ch:10 Cyber Safety: A. Fill in The Blanks
Satya Prakash Public School Class 7 Ch:10 Cyber Safety: A. Fill in The Blanks
Class 7th
Ch:10 Cyber Safety
A. Fill in the blanks :
1. Computer ethics
2. Citation
3. Cyber bulling
4. Hacking
5. Intellectual property
1.Spam are unwanted bulk e-mail that come from strange sources. True
2. Hacking is the usage or imitation of the language and thoughts of another person and
projecting them as ons’s own original work. False
3. you can identify the unsecured websites by looking at the lock sign or https on the address bar.
True
5. A patent grants the inventor the sole right to make , use and sell that invention for an unlimited
period. False.
D. MCQs
1. Spams
2. Cookies
3. Copyright
4. Encryption
5. Phishing
Q2. Write any four ethical guide line which should be followed while using a computer?
A. Four ethical guide line which should be followed while using a computer are:
3)do not claim ownership on a work which is the output of someone else intellect.
or
The practice of taking someone else's work or ideas and passing them off as one's own:
Q4. How can you protect your intellectual property right from getting violated?
• Spamming: Spamming is the use of messaging systems to send multiple unsolicited messages
(spam) to large numbers of recipients for the purpose of commercial advertising, for the purpose
of non-commercial proselytizing, for any prohibited purpose (especially the fraudulent purpose
of phishing), or simply sending the same message over and over to the same user.
• Cybercrime : Any offenses committed against individuals or groups of individuals to harm the
reputation or cause physical or mental trauma through electronic means can be defined as
Cybercrime.
• Firewall: A firewall is a network security device that monitors incoming and outgoing network
traffic and decides whether to allow or block specific traffic based on a defined set of security
rules. An early type of firewall device, a proxy firewall serves as the gateway from one network
to another for a specific application.
• Software Piracy : Software Piracy is the illegal approach of copying, distributing, modifying,
selling, or using the software which is legally protected. So in a simple term, we can say
Software piracy is the act of stealing legal software in an illegal way. This software piracy
refers to the unauthorized copy and use of legal software.
• Softlifting-
It is the most common type of software piracy. In this piracy, the legal owner of the software is
one, but the users are multiple. For instance, someone purchases the genuine software, and
others will illegally use that software by downloading the software to their computer.
• Hacking: Hacking is refers to illegal intrusion into a computer system or network.
• Phishing: Phishing is an act of sending an email to a user, misleading him to believe that it is
form a trusted person or organization , in an attempt to obtain sensitive information for malicious
purpose.