Kips Class 7 Cyber Apps Chapter 10 Cyber Safety

Chapter 10 Cyber Safety

Brain Developer
A. Fill in the blanks:
1. Computer Ethics are a set of procedures, moral principles, and ethical practices that regulates the use of computer.
2. The simplest way to prevent plagiarism is citation.
3. Cyber bulling is an act of deliberating harming, harassing, or targeting a person by another person using the Internet.
4. An illegal intrusion into a computer system or network is known as hacking.
5. Intellectual property is a term referring to the legal property rights of a person over creations of his/her mind, both, artistic and commercial.

B. State True or False:
1. Spams are unwanted bulk e-mails that come from strange sources. (True)
2. Hacking is the usage or imitation of the languages and thoughts of another person and projecting them as one’s own original work. (False)
Correct Answer:
Plagiarism is the usage or imitation of the languages and thoughts of another person and projecting them as one’s own original work.
3. You can identify the unsecured websites by looking at the lock sign or https on the address bar. (False)
Correct Answer:
You cannot identify the unsecured websites by looking at the lock sign or https on the address bar.
4. Encryption is the process of transforming data into an unreadable code. (True)
5. A patent grants the inventor the sole right to make, use, and sell that invention for an unlimited period. (False)
Correct Answer:
A patent grants the inventor the sole right to make, use, and sell that invention for a specific period of time.

C. Application Based Questions:
1. Neha is confused in deciding whether the mail which she has received is a genuine one or a spam. Can you help her in identifying any indicative feature?
Answer:
Spams are unwanted bulk e-mails that come from strange sources. Indicative features of spam messages are that they do not include your e-mail address in the TO: or CC: fields are common forms of spam. Some spam e-mail can contain offensive language or links to websites with inappropriate content.

2. Ruby is surfing the internet to prepare herself for the Civil Services Examination. She wants to know whether the websites which she is referring are secured or not. Suggest her the way in which she can clear her doubt.
Answer:
The URL of a secured website starts with https//: and your browser displays an icon of the closed lock.

D. Multiple Choice Questions:
1. The unwanted bulk e-mails that come from strange sources are called as _________________.
a) Spams
b) Trash
c) Junk
Answer:
a) Spams

2. _________________ is a small text file stored on your computer’s browser directory that collects the information of your online activity and reports back to the host.
a) Register
b) Cookie
c) Browser
Answer:
b) Cookie

3. A _________________ is a legal right granted by law to the creator for his original work.
a) Copyright
b) Patent
c) Trademark
Answer:
a) Copyright

4. _____________ is the process of transforming data into an unreadable code.
a) Encoding
b) Encryption
c) Decryption
Answer:
b) Encryption

5. _____________ is an act of sending an e-mail to a user misleading him to believe that it is from a trusted person or organisation, in an attempt to obtain sensitive information for malicious purpose.
a) Phishing
b) Spamming
c) Hacking
Answer:
a) Phishing

E. Answer the following:
1. What are the advantages of internet?
Answer:

• Forum: An Internet Forum is an online discussion where like-minded people can hold conversations in the form of posted messages.
• Social Networking: It is the latest way to communicate. It offers a platform where an individual can connect with friends and strangers on the basis of shared interests or views. Example: Facebook, Twitter, etc.
• Education: It is widely used for educational purpose by students, teachers etc., to learn anytime and anywhere. The Internet is a vast storehouse of information and is also used to publish papers and articles.

2. Write down any four ethical guidelines which should be followed while using a computer.
Answer:

• Do not use computer technology to steal information or to cause disruption or interference in other users’ work.
• Do not spy on another person’s computer data.
• Avoid buying pirated software. Pay for the software unless it is free.
• Do not use someone else’s computer resources without an authorization. 

3. Define plagiarism. What steps can be taken to prevent it?
Answer:
Plagiarism is the usage or imitation of the language and thoughts of another person projected as one’s own original work. Steps that can be taken to prevent it are:
• All sources are neither accurate, nor they validate the information as accurate. Therefore, you must specify the source, which informs readers regarding the basis of your ideas and the extent of your research. Citation gives the strength to your resources.
• To avoid plagiarism, one can rephrase the matter.
• Use quotation marks around all the quoted words of another person to avoid plagiarism.

4. How can you protect your Intellectual Property Rights from getting violated?
Answer:
Ways to protect Intellectual Property Rights from getting violated
• Patent your inventions
• Copyright your Art and Publications
• Register your Trademarks

5. Write short notes on:
a. Spamming
b. Cybercrime
c. Firewall
d. Software Piracy
e. Hacking
f. Phishing
Answer:

a. Spams are unwanted bulk e-mails that come from strange sources. Spams are generally sent in large numbers for commercial advertising. In spamming, millions of copies of the same message are sent to e-mail users worldwide.

b. Cybercrime is any illegal activity done through the Internet, e.g., identify theft, where somebody can steal your e-mail id or password and use it to send fake e-mails containing false information about a product, winning a lottery, etc.

c. Firewall is a security system that prevents unauthorised people to access your system and network. It can be either software or hardware, or a combination of both. 

d. When software is copied and distributed illegally, it is called Software Piracy.

e. Hacking refers to an illegal intrusion into the computer system or network. 

f. It is an act of sending an e-mail to a user misleading him to believe that it is from a trusted person or organisation.

No comments:

Post a Comment

Also read!

Click on any of the below text for additional links:

Class 6

Class 6 Computer Kips Solutions
Class 6 Gul Mohar English Solutions
→ Class 6 Map Pointing Solutions
Class 6 NCERT Civics Solutions
Class 6 NCERT Geography Solutions
Class 6 NCERT History Solutions
Class 6 NCERT Maths Solutions
Class 6 NCERT Science Solutions

Class 7

Class 7 Computer Kips Solutions
Class 7 Gul Mohar English Solutions
English Grammar Class 7
English Writing Skills Class 7
Class 7 Map Pointing Solutions
Class 7 NCERT Civics Solutions
Class 7 NCERT Civics Notes
Class 7 NCERT Civics Extra Questions
Class 7 NCERT Geography Solutions
Class 7 NCERT Geography Notes
Class 7 NCERT Geography Extra Questions
Class 7 NCERT History Solutions
Class 7 NCERT History Notes
Class 7 NCERT History Extra Questions
Class 7 NCERT Maths Solutions
Class 7 NCERT Science Solutions
Class 7 NCERT Science Notes
Class 7 NCERT Science Extra Questions

Class 8

Class 8 Kips Artificial Intelligence Solutions
Class 8 Gul Mohar English Solutions
English Grammar Class 8
English Writing Skills Class 8
Class 8 Map Pointing Solutions
Class 8 NCERT Civics Solutions
Class 8 NCERT Civics Notes
Class 8 NCERT Civics Extra Questions
Class 8 NCERT Geography Solutions
Class 8 NCERT Geography Notes
Class 8 NCERT Geography Extra Questions
Class 8 NCERT History Solutions
Class 8 NCERT History Notes
Class 8 NCERT History Extra Questions
Class 8 NCERT Maths Solutions
Class 8 NCERT Science Solutions
Class 8 NCERT Science Notes
Class 8 NCERT Science Extra Questions
Class 8 NCERT Science Exemplar
Class 8 NCERT Science MCQs

Class 9

Class 9 Kips Artificial Intelligence Solutions
Class 9 Map Pointing Solutions
Class 9 NCERT Civics Solutions
Class 9 NCERT Geography Solutions
Class 9 NCERT History Solutions
Class 9 NCERT Maths Solutions
Class 9 NCERT Science Solutions

Class 10

Class 10 Kips Artificial Intelligence Solutions
Class 10 NCERT English Solutions
→ Class 10 Map Pointing Solutions
Class 10 NCERT Civics Solutions
Class 10 NCERT Civics Notes
Class 10 NCERT Civics Extra Questions
Class 10 NCERT Geography Solutions
Class 10 NCERT Geography Notes
Class 10 NCERT Geography Extra Questions
Class 10 NCERT History Solutions
→ Class 10 NCERT History Notes
Class 10 NCERT History Extra Questions
Class 10 NCERT Maths Solutions
Class 10 NCERT Science Solutions
Class 10 NCERT Science Notes
Class 10 NCERT Science Extra Questions

Computer Languages

Python Basics

Extra Activities

Extra Activities

Extra Knowledge

Extra Information
General Knowledge
Historical Places in India
Latest technology
Physical Sciences
Facts

• Mathematics quick links
Mathematical Terms
Maths Tricks

Home Top