Page 51 - iPrime_V2.2_class7
P. 51

4.  A ..................................... is a symbol, word, or design legally registered to represent
                       a company or product.

                       a. Patient                                      c. Trademark

                       b. Cyberbullying                                d. Copyright

                    5.  ..................................... refers to unwanted emails, often from companies trying to
                       advertise their products.
                       a. Phishing                                     c. Cyberbulling

                       b. Spam                                         d. Hacking

                 B.  Write ‘T’ for true and ‘F’ for false.

                    1.  A digital footprint is an impression left by a user while using the Internet. ................................

                    2.  Always upload inappropriate content online.                                  ................................
                    3.  Keep your privacy settings always off.                                       ................................

                    4.  We shouldn't use other people's content without their permission.            ................................

                    5.  We cannot delete the browsing history of a browser.                          ................................

                 C.  Fill in the blanks using the words given below:
                                           Hints

                                               Phishing, Trademark, Plagiarism, Patent, Spam


                    1.  ................................ is a symbol legally registered for use by a company.

                    2.  ................................ is the practice of taking ideas or creations of someone else without their
                       permission.

                    3.  ................................ gives an inventor the complete right to make, use, and sell their work for
                       a specific time period.

                    4.  ................................ is a cybercrime in which an e-mail that falsely claims to be from a trusted
                       organisation is sent to a user.
                    5.  ................................ is also called bulk e-mail.



                  Let's Do            It                                                    Section B (Subjective)




                 A.  Short answer type questions.
                    1.  Define software piracy.

                    2.  What is hacking?

                    3.  Give any two examples of Intellectual Property Rights.



                                                                       Ethics and Safety Measures in Computing     49
   46   47   48   49   50   51   52   53   54   55   56