Page 65 - KEC Khaitan C6 Flipbook
P. 65
2. Fill in the blanks using the words from the help box.
Spamming, 2008, Software piracy, Phishing
a. The illegal practice of obtaining sensitive information through e-mails is known as ____________.
b. The act of repeatedly sending unwanted e-mails to a large number of recipients is called ____________.
c. Unauthorised copying or stealing of software is known as ____________.
d. The Information Technology Amendment Act was enacted in the year ____________.
3. Write 'T' for true and 'F' for false.
a. Cyber security aims to protect only financial information.
b. Phishing involves sending legitimate offers and rewards via e-mails.
c. Digital footprints can be used by law enforcement agencies to track offenders.
d. Plagiarism is considered academic dishonesty and literary theft.
e. The Information Technology Act, 2000 provides legal recognition to all
e-transactions.
4. Answer in one or two words.
a. What is the act of intruding into a computer system for harmful purposes called?
______________________________________________________________________________________
b. What is the term for unwanted e-mails sent repeatedly?
______________________________________________________________________________________
c. What are the exclusive rights given by the government to protect intellectual creations called?
______________________________________________________________________________________
d. What are the online or Internet-based illegal acts called?
______________________________________________________________________________________
e. What is the property that arises from human intelligence called?
______________________________________________________________________________________
5. Think and answer.
a. Your friend has copied information from the Internet without crediting the source for his
project. Explain why this is unethical and what the consequences might be.
______________________________________________________________________________________
______________________________________________________________________________________
Cyber Security 63

