Page 17 - Chinmaya_C8_flipbook
P. 17

•   Some hackers use this technique for national security, creating safer systems, etc. This is
                       known as ethical hacking.

                    •   Online transaction fraud refers to the illegal withdrawing or transferring of money from one
                       bank account to another by a cybercriminal.
                    •   Plagiarism refers to the usage or imitation of the language and thoughts of another person
                       projected as one’s own original work.

                    •   Digital Footprint is used to describe the mark, traces or "footprints" that a person leaves
                       when he use internet.









                 test YoUr skiLLs




                 1.  Tick ( ) the correct option.

                    a. A Digital Footprint is also known as                     .

                      (i)   Digital Diary                              (ii)   Digital Dossier
                      (iii)  Database                                  (iv)  None of the above

                    b.  Why do hackers break into the other’s computer system?

                      (i)   To steal important data                    (ii)   To destroy the system

                      (iii)  Both (i) and (ii)                         (iv)  None of these

                    c.   When the electronic devices are used to harass or embarrass other person then it is called as
                                            .

                      (i)   Hacking                                    (ii)   Spamming

                      (iii)  Cyberbullying                             (iv)  Social Networking

                    d.  When someone sends e-mails that appear genuine from a trusted e-mail ID but in reality they're
                       not to be trusted. It is called .

                      (i)  Spamming                                    (ii)  E-mail spoofing

                      (iii)  Phishing                                  (iv)  None of these

                    e.  Which type of cyber crime is referred to sending of bulk mail by an identified or unidentified
                       source?
                      (i)  Hacking                                     (ii)  Spamming

                      (iii)  Phishing                                  (iv)  None of these



                                                                                                 Digital Safety Tips  15
   12   13   14   15   16   17   18   19   20   21   22