Page 57 - TP_iPlus_V2.1_Class7
P. 57

#Ethical & Moral Reasoning
                 Higher Order Thinking Skills (HOTS)

                 1.   Javisha, a staff member at “KYC Technologies Ltd.,” subscribes to several free IT magazines. To
                    activate her subscriptions, she is asked to provide personal details such as her month and year of
                    birth and her mother's maiden name. Is it appropriate for Javisha to share these personal details?
                    Why or why not?
                 2.   In a city where technology was deeply woven into everyday life, Seema enjoyed the ease brought by
                    smart devices and online connectivity. However, one day she noticed ads specifically tailored to her
                    private conversations, which made her aware of how much of her digital activity was being monitored.
                    What does this scenario suggest?





                                                                                     #Problem Solving & Logical Reasoning
                          Crack The Code                                             #Digital Literacy


                  Solve the crossword using the clues given below.
                      Across
                      1.  Unauthorized access to a computer system.
                      4.  Right that gives inventor complete right to sell his work.
                      7.  Unethical practices.
                      8.  Buying and selling of goods and services online.
                      Down                                      3
                      2.  Global network.                       S
                      3.  Bulk email.
                                                            6               2
                      5.  Illegal use of software.
                                                       1   H                 I
                      6.  Secure websites starts with.
                                                               M



                                                            P           8    E           M             R



                                                                            N

                                                       5

                                                   4   P            E        T


                                                       R




                                                   7   C            E            R            E








                                                                                                                  55
                                                                         Ethics and Safety Measures in Computing
   52   53   54   55   56   57   58   59   60   61   62