Page 131 - Chinmaya_C7_flipbook
P. 131

1.  Tick ( ) the correct option.

                    a.  Repeatedly sending unwanted e-mails to a large number of recipients is called ____________.

                        (i)  Hacking                                (ii)  Phishing
                       (iii)  Spamming                              (iv)  None of these

                    b.  Copying and pasting someone else’s work and posing it as your own is called ____________.

                        (i)  Software piracy                        (ii)  Plagiarism
                       (iii)  Hacking                               (iv)  Both (i) & (ii)

                    c.  Which Cyber Security Act provides legal recognition to all e-transactions?

                        (i)  Indian Cyber Act 2000                  (ii)  Information Technology Act 2008
                       (iii)  Cyber Security Policy 2013            (iv)  None of these

                    d.   Unauthorised copying or stealing of software, movies, music and making these copies
                      available on the Internet is called ____________.

                        (i)  Plagiarism                             (ii)  Digital footprints
                       (iii)  Software piracy                       (iv)  Hacking


                 2.  Fill in the blanks using the words from the help box.


                                         Phishing, Plagiarism, Computer Ethics, Hacker

                    a.  ____________ is the act of copying somebody's information or projects without crediting the original
                      creator.

                    b.   The  person who  involves in intruding  into  computer  system  for  harmful  activities  is called a
                      ____________.

                    c.  ____________ is the illegal practice of obtaining sensitive information through e-mails.

                    d.  ____________ are rules that govern our actions when we use computers and the Internet.


                 3.  Think and answer.
                    a.  What do you understand by computer ethics?

                     ______________________________________________________________________________________
                    b.  Define hacking.

                     ______________________________________________________________________________________








                                                                                                   Cyber Security  129
   126   127   128   129   130   131   132   133   134   135   136