Page 130 - Trackpad_V5_Book 7
P. 130
1. Tick ( ) the correct option.
a. Repeatedly sending unwanted e-mails to a large number of recipients is called ____________.
(i) Hacking (ii) Phishing
(iii) Spamming (iv) None of these
b. Copying and pasting someone else’s work and posing it as your own is called ____________.
(i) Software Piracy (ii) Plagiarism
(iii) Hacking (iv) Both (i) & (ii)
c. Which Cyber security Act provides legal recognition to all e-transactions?
(i) Indian Cyber Act 2000 (ii) Information Technology Act 2008
(iii) Cyber Security Policy 2013 (iv) None of these
d. Unauthorised copying or stealing of software, movies, music and making these copies
available on the Internet is called ____________.
(i) Plagiarism (ii) Digital footprints
(iii) Software Piracy (iv) Hacking
2. Fill in the blanks using the words from the help box.
Phishing, Plagiarism, Computer Ethics, Hacker
a. ____________ is the act of copying somebody's information or projects without crediting the
original creator.
b. The person who involves in intruding into computer system for harmful activities is called
a ____________.
c. ____________ is the illegal practice of obtaining sensitive information through e-mails.
d. ____________ are rules that govern our actions when we use computers and the Internet.
3. Think and answer.
a. What do you understand by computer ethics?
______________________________________________________________________________________
b. Define hacking.
______________________________________________________________________________________
128 Pro (Ver. 5.0)-VII

