Page 131 - TrackpadV2.1_Class8
P. 131

b.  What is the correct term for copying someone else's work and claiming it as your own?

                        (i)  Software piracy                        (ii)  Plagiarism
                       (iii)  Hacking                               (iv)  Both (i) & (ii)

                    c.  Which Cyber Security Act provides legal recognition to all e-transactions?

                        (i)  Indian Cyber Act 2000                  (ii)  Information Technology Act 2008
                       (iii)  Cyber Security Policy 2013            (iv)  None of these

                    d.   Unauthorised copying or stealing of software, movies, music and making these copies
                      available on the Internet is called ____________.

                        (i)  Plagiarism                             (ii)  Digital footprints
                       (iii)  Software piracy                       (iv)  Hacking


                 2.  Fill in the blanks using the words from the help box.

                                       Phishing, Cyber Security, Computer Ethics, Hacker

                    a.   The act of protecting computers and networks from harmful attacks is called ____________.

                    b.   The  person who  involves in intruding  into  computer  system  for  harmful  activities  is called a
                      ____________.

                    c.  ____________ is the illegal practice of obtaining sensitive information through e-mails.

                    d.  ____________ are rules that govern our actions when we use computers and the Internet.

                 3.  Think and answer.

                    a.  What do you understand by the term computer ethics?
                     ______________________________________________________________________________________

                    b.  Define hacking.
                     ______________________________________________________________________________________
                    c.  What steps can you take to ensure that you are not a victim of cyber crime?
                     ______________________________________________________________________________________

                     ______________________________________________________________________________________

                    d.  What are digital footprints? List some activities that are recorded on the Internet.
                     ______________________________________________________________________________________
                     ______________________________________________________________________________________

                     ______________________________________________________________________________________

                    e.  What is the Information Technology Amendment Act of 2008?
                     ______________________________________________________________________________________
                     ______________________________________________________________________________________

                     ______________________________________________________________________________________



                                                                                                   Cyber Security  129
   126   127   128   129   130   131   132   133   134   135   136