Page 51 - iPro_trackGPT_V5_Class7
P. 51

B.  Long answer type questions.

                     1.  Explain any two advantages of the Internet.

                        ...................................................................................................................................................................................

                        ...................................................................................................................................................................................


                        ...................................................................................................................................................................................
                        ...................................................................................................................................................................................


                     2.  Write four safety measures for protecting privacy online.

                        ...................................................................................................................................................................................

                        ...................................................................................................................................................................................

                        ...................................................................................................................................................................................

                        ...................................................................................................................................................................................

                     3.  What measures can be taken to Protect Intellectual Property Right?

                        ...................................................................................................................................................................................

                        ...................................................................................................................................................................................

                        ...................................................................................................................................................................................

                        ...................................................................................................................................................................................


                 C.  Application-based questions.
                     1.  During a project,  Alex downloads  an entire report  from the Internet  and

                        presents it as his own. What unethical practice has Alex committed?
                     2.  Sarah receives an email claiming to be from her bank, asking for her account details.

                        Identify the type of cybercrime this email represents and explain the steps Sarah should
                        take to verify its legitimacy before responding.





                                                                                   #Interdisciplinary
                 Higher Order Thinking Skills (HOTS)
                     1.  Examine how digital footprints are created and discuss the methods one can use to
                        delete or reduce these digital footprints.
                     2.  Assess the effectiveness of safety measures like two-factor authentication in protecting
                        online accounts.









                                                                        Ethics and Safety  Measures in Computing  49
   46   47   48   49   50   51   52   53   54   55   56