Page 131 - TrackpadV2.1_Class8
P. 131
b. What is the correct term for copying someone else's work and claiming it as your own?
(i) Software piracy (ii) Plagiarism
(iii) Hacking (iv) Both (i) & (ii)
c. Which Cyber Security Act provides legal recognition to all e-transactions?
(i) Indian Cyber Act 2000 (ii) Information Technology Act 2008
(iii) Cyber Security Policy 2013 (iv) None of these
d. Unauthorised copying or stealing of software, movies, music and making these copies
available on the Internet is called ____________.
(i) Plagiarism (ii) Digital footprints
(iii) Software piracy (iv) Hacking
2. Fill in the blanks using the words from the help box.
Phishing, Cyber Security, Computer Ethics, Hacker
a. The act of protecting computers and networks from harmful attacks is called ____________.
b. The person who involves in intruding into computer system for harmful activities is called a
____________.
c. ____________ is the illegal practice of obtaining sensitive information through e-mails.
d. ____________ are rules that govern our actions when we use computers and the Internet.
3. Think and answer.
a. What do you understand by the term computer ethics?
______________________________________________________________________________________
b. Define hacking.
______________________________________________________________________________________
c. What steps can you take to ensure that you are not a victim of cyber crime?
______________________________________________________________________________________
______________________________________________________________________________________
d. What are digital footprints? List some activities that are recorded on the Internet.
______________________________________________________________________________________
______________________________________________________________________________________
______________________________________________________________________________________
e. What is the Information Technology Amendment Act of 2008?
______________________________________________________________________________________
______________________________________________________________________________________
______________________________________________________________________________________
Cyber Security 129

