Page 56 - TP_iPlus_V2.1_Class7
P. 56
B. Fill in the blanks using the words given below.
Hints: Encryption, Private, Right to Privacy, Digital Dossier, Green
1. A Digital Footprint is also known as a ................................ .
2. ................................ is the process of transforming data into unreadable code to maintain privacy.
3. The ................................ may be defined as the right of individuals or groups of people to know and
decide when, how, and to what extent their information may be shared with others.
4. In Microsoft Edge, ................................ browsing allows you to browse the Internet without saving any
information about which sites and pages you've visited.
5. The ................................ lock sign at the address bar ensures that the site is secure.
C. Write ‘T’ for true and ‘F’ for false.
1. The victims of cybercrimes are always individuals. ................................
2. Cyberbullying refers to the use of Internet, e-mail, instant messaging, chat rooms
or social networks, such as Facebook, Twitter, etc. to harass, demean, embarrass
or intimidate someone else. ................................
3. It is a good practice to connect with unknown people on Social media. ................................
4. The illegal withdrawing or transferring of money from one bank account to
another by a cybercriminal is called E-Banking. ................................
5. Software piracy means the illegal use and distribution of software. ................................
Section B (Subjective)
A. Short answer type questions:
1. What is ethical hacking?
2. What do you mean by spamming?
3. Define digital footprint.
4. How can you protect intellectual property rights.
B. Long answer type questions:
1. Write four steps to protect your privacy.
2. Explain the types of online transaction fraud.
3. How can you safeguard yourself from cyberbullying?
4. What instructions should a parent give to their child when using the internet?
C. Competency-based/Application-based questions:
1. Manan has gained unauthorized access to Arjun’s system and is using Arjun’s account to chat with
his friends. What type of cybercrime does this represent?
2. Garima has obtained software from a file-sharing website without paying for it.
What is the term for this illegal use of software?
54
iPlus (Ver. 2.1)-VII

