Page 18 - Modular_V1.1_Flipbook
P. 18
Choose secure passwords that are unique to each login and be sure to change them regularly.
Remember that anything posted is public (even if your social network settings are private)
as the information is stored on a server.
Recap
Internet is also called "the NET" or Network of Networks, which means International Network.
Computer Ethics are the common guidelines that we need to follow while using a computer.
Internet ethics are the moral principles that one should follow while using the Internet.
The action which is not considered morally right or good for a person, a profession or an
industry is an Unethical Practice.
Exercise
A. Tick (3) the correct option.
1. Which of the following is known as illegal distribution of software?
a. Software piracy c. Hacking
b. Spam d. Cookie
2. Which of the following is the other name for Digital Footprint?
a. Digital Diary c. Digital Dossier
b. Database d. None of the above
3. Harassing or embarrassing a person using electronic devices is known as .......................... .
a. Hacking c. Spamming
b. Cyberbullying d. Social Networking
4. We can assure the security of a website by looking at the .......................... sign on the address bar.
a. lock c. unlock
b. square d. None of these
5. Which of the following is not a types of intellectual property right?
a. Trademark c. Patent
b. Copyright d. None of these
6. .......................... are the unwanted mails we received from the companies who want to advertise
their products.
a. Spams c. Cookies
b. Hackers d. All of these
7. Which of the following is also known as online bullying?
a. Cyberbulling c. Hacking
b. Spamming d. Phishing
B. Write ‘T’ for true and ‘F’ for false.
16 Touchpad MODULAR (Version 1.1)-IX

