Page 64 - KEC Khaitan C6 Flipbook
P. 64
REVISIT
▶ The online or Internet-based illegal acts are called cyber-crimes.
▶ Computer ethics are rules that govern our actions when we use computers and the Internet.
▶ Spamming refers to the act of repeatedly sending unwanted e-mails called spam to a large number of recipients.
▶ Hacking is an act of intruding into someone’s computer system for some unwanted purposes by identifying
the technical weak points of the security system.
▶ Phishing is the illegal practice of obtaining sensitive information from us through e-mails.
▶ Plagiarism is an act of copying information from the Internet and using it in our projects or works.
▶ Software piracy is the unauthorised copying or stealing of software, movies, music or making these copies
available on the Internet.
▶ Intellectual property rights are the exclusive rights given by the government to the owners of intellectual
creations.
▶ Digital footprints or Digital Shadow are the traceable digital activities that we leave behind after surfing the
Internet.
1. Tick ( ) the correct option.
a. How does the practice of protecting computers from malicious attacks function?
(i) Cyber space (ii) Cyber crime
(iii) Cyber security (iv) Computer ethics
b. Which of the following acts refers to sending unwanted e-mails repeatedly?
(i) Phishing (ii) Hacking
(iii) Spamming (iv) Plagiarism
c. How does the illegal practice of obtaining sensitive information via emails work?
(i) Phishing (ii) Spamming
(iii) Hacking (iv) Piracy
d. Which year did the National Cyber Security Policy come into effect in India?
(i) 2000 (ii) 2008
(iii) 2013 (iv) 2015
e. How can individuals manage or clear their traceable activities after surfing the Internet?
(i) Cyber crime (ii) Digital footprints
(iii) Intellectual property (iv) Malware
62 Premium Edition-VI

