Page 52 - iPrime_V2.2_class7
P. 52

4.  Write two ways to stop cyberbullying.

                      5.  What are computer ethics?

                  B.  Long answer type questions.

                      1.  Write the difference between a patent and a trademark.
                      2.  What is Internet? Write any three disadvantages of it.

                      3.  Write any three protective measures to avoid plagiarism.

                      4.  Write three ways to stay protected online.

                  C.  Application-based questions.
                      1.  Anju received an email in her inbox. She is not sure whether the mail she has received is
                         genuine or spam. Help her identify it.

                      2.  Rajiv is exploring the Internet to prepare for his presentation. He wants to know
                         whether the websites he is exploring are secure or not. Suggest him a way.


                                                                                                    Computational Thinking
                  Higher Order Thinking Skills (HOTS)

                      1.   Should an individual share personal details like their month of birth, year of birth, and
                         mother's maiden name to activate subscriptions to free services? Why or why not? Discuss
                         the potential risks of sharing such information.

                      2.   What does it mean when targeted ads appear based on private conversations or activities?
                         Explain the implications of such a digital presence and how it may affect privacy.







                    Crack The            Code                                                         Critical Thinking



                  Solve the crossword using the clues given below.

                  Across

                  1.  It is also referred to as a network of networks.
                  2.  We refer to it as a digital dossier.
                  3.   It is the act of gaining unauthorised access to a computer system with the intent to destroy
                      data or steal important information.

                  5.  An individual unlawfully breaches a computer system to pilfer crucial data.
                  Down

                  4.   A legally registered or established symbol or word serves as a representation for a company
                      or product.



                  50     Touchpad iPRIME (Ver. 2.2)–VII
   47   48   49   50   51   52   53   54   55   56   57