Page 47 - 2611_SmartGPT Pro V(5.0) C-7
P. 47
They choke the Internet and waste our time. Stopping these spam e-mails is difficult, but there are
many services available on the Internet which can prevent spammers from sending these e-mails.
PLAGIARISM
Following are some tips to avoid spams: Plagiarism is the act of copying information from
Avoid sharing your e-mail id with everyone. the Internet and using it in one’s projects or work
Set up filters to scan your e-mails and segregate spam or junk e-mails into a separate folder. without crediting the original creator. Collins
Never revert to any spam e-mail. Dictionary defines plagiarism as the practice of
using someone else’s work and pretending that it
is your own. It is considered academic dishonesty
and literary theft.
What is the name of the first hacker?
Following are some tips to avoid plagiarism:
HACKING Do not copy someone else’s work.
Hacking is the act of intruding into a computer Do not submit someone’s work without the permission of the contributors involved.
system for harmful purposes by identifying the Do not keep the same structure of someone else’s work and only modify the text.
technical weak points of the security system using
smart programming solutions. The person involved 1. What are the trail or records we leave behind after surfing the Internet
called?
in these activities is called a hacker. ______________________________________________________________
Following are some tips to avoid hacking: uiz Bee 2. What is the illegal practice of obtaining sensitive information through
21 st
#Initiative
Update your operating system, web browser e-mails? Century
Skills
______________________________________________________________
and anti-virus.
Install a firewall on your computer as it does not allow hackers and viruses to get attached to
your computer. SOFTWARE PIRACY
Software piracy is the unauthorised copying or stealing of software, movies, music and making
PHISHING these copies available on the Internet. Every software has a license. When we buy a software, we
Phishing is the illegal practice of obtaining sensitive information through e-mails. The criminals become an authorised user of that software.
try to get information like user name, password and credit card details from us through e-mails. But, if we make copies of the software and give it to others to use, then it is against the law. There
People with malicious intentions usually fake their identity and pose as a known contact or are different types of software piracy including borrowing and installing a copy of the software
organisation. from someone, installing and selling unauthorised copies of the software, duplicating and selling
They send e-mails from legitimate-looking copyrighted programs and downloading illegal software from the Internet.
websites with genuine-looking offers, rewards Following are some tips to avoid software piracy:
or concerns as attachments. If opened, it installs Do not download any software without license.
malware in our system or directs us to a website Register yourself on the company’s official website before using the software.
for entering our sensitive information.
Following are some tips to avoid phishing: INTELLECTUAL PROPERTY RIGHTS
Do not open e-mails without verifying the The property that arises from human intelligence is called intellectual property. It includes creations
source. of the mind like books, paintings, music compositions, movies, video games, software, etc.
Do not share your personal information via e-mails. It must be shared only via smartphone or Intellectual Property Rights are the exclusive rights given by the government to the owners of
a secure website. intellectual creations. We can protect our creations by creating copyrights on them.
Cyber Security 45

