Page 277 - CA_Blue( J )_Class9
P. 277

Unsolved Questions



                 A.  Tick ( ) the correct answer.
                    1.  This grants the owner or innovator the exclusive right to produce, use, or sell the invention, typically for up to 20
                        years.
                        a.   Patents                                   b.  Trademarks
                        c.   Data Privacy                              d.  Data Protection
                    2.  ………………… are unsolicited emails sent mainly with the idea of an online business scheme.
                        a.   Patents                                   b.  Spams
                        c.   Anti-virus                                d.  Commercial Software

                    3.   When  there  is  illegal  duplication,  distribution  or  sale  of  copyrighted  material  with  the  intent  of  imitating  the
                        copyrighted product, then it is known as ………………… of Software.
                        a.   Internet piracy                           b.  End user piracy
                        c.   Counterfeiting                            d.  Software misuse

                    4.   If a Legal user breaks the copyright rules and makes copies of the software without authorisation is called ………………….
                        a.   Internet piracy                           b.  End user piracy
                        c.   Counterfeiting                            d.  Software misuse
                    5.   Which one of the following is NOT a good way of protecting oneself from cybercrimes?
                        a.  Strong passwords                           b.  Use of pirated software
                        c.  Use of Internet security suite             d.  Children should know about threats
                 B.  Fill in the blanks.

                    1.   A good anti-spam and anti-virus software is the best way to get rid of ………………….
                    2.  Buy ………………… software and keep them updated.
                    3.   ………………… is a method of influencing a minor for sexual abuse without their consent.
                    4.   ………………… features should be disabled so that nothing can be installed without your permission.
                    5.  …………………  is a way of abusing a person by hurting their integrity using the Internet.

                 C.  Short Answer type questions.
                    1.   What do you mean by cyber terrorism?
                    2.   What is software piracy, and why is it a major concern for software companies?
                    3.   Define Copyright.
                    4.   Define Data Privacy.
                    5.   Write four Netiquettes.
                    6.   When was the "Data Protection Act" implemented?
                    7.   Write four ways to stay safe from malicious code.
                    8.   What is Industrial Espionage?
                    9.   What is IP snooping?
                   10.   What is Cyberwarfare?














                                                                                           Computing and Ethics  275
   272   273   274   275   276   277   278   279   280   281   282