Page 277 - CA_Blue( J )_Class9
P. 277
Unsolved Questions
A. Tick ( ) the correct answer.
1. This grants the owner or innovator the exclusive right to produce, use, or sell the invention, typically for up to 20
years.
a. Patents b. Trademarks
c. Data Privacy d. Data Protection
2. ………………… are unsolicited emails sent mainly with the idea of an online business scheme.
a. Patents b. Spams
c. Anti-virus d. Commercial Software
3. When there is illegal duplication, distribution or sale of copyrighted material with the intent of imitating the
copyrighted product, then it is known as ………………… of Software.
a. Internet piracy b. End user piracy
c. Counterfeiting d. Software misuse
4. If a Legal user breaks the copyright rules and makes copies of the software without authorisation is called ………………….
a. Internet piracy b. End user piracy
c. Counterfeiting d. Software misuse
5. Which one of the following is NOT a good way of protecting oneself from cybercrimes?
a. Strong passwords b. Use of pirated software
c. Use of Internet security suite d. Children should know about threats
B. Fill in the blanks.
1. A good anti-spam and anti-virus software is the best way to get rid of ………………….
2. Buy ………………… software and keep them updated.
3. ………………… is a method of influencing a minor for sexual abuse without their consent.
4. ………………… features should be disabled so that nothing can be installed without your permission.
5. ………………… is a way of abusing a person by hurting their integrity using the Internet.
C. Short Answer type questions.
1. What do you mean by cyber terrorism?
2. What is software piracy, and why is it a major concern for software companies?
3. Define Copyright.
4. Define Data Privacy.
5. Write four Netiquettes.
6. When was the "Data Protection Act" implemented?
7. Write four ways to stay safe from malicious code.
8. What is Industrial Espionage?
9. What is IP snooping?
10. What is Cyberwarfare?
Computing and Ethics 275

