Page 51 - iPro_trackGPT_V5_Class7
P. 51
B. Long answer type questions.
1. Explain any two advantages of the Internet.
...................................................................................................................................................................................
...................................................................................................................................................................................
...................................................................................................................................................................................
...................................................................................................................................................................................
2. Write four safety measures for protecting privacy online.
...................................................................................................................................................................................
...................................................................................................................................................................................
...................................................................................................................................................................................
...................................................................................................................................................................................
3. What measures can be taken to Protect Intellectual Property Right?
...................................................................................................................................................................................
...................................................................................................................................................................................
...................................................................................................................................................................................
...................................................................................................................................................................................
C. Application-based questions.
1. During a project, Alex downloads an entire report from the Internet and
presents it as his own. What unethical practice has Alex committed?
2. Sarah receives an email claiming to be from her bank, asking for her account details.
Identify the type of cybercrime this email represents and explain the steps Sarah should
take to verify its legitimacy before responding.
#Interdisciplinary
Higher Order Thinking Skills (HOTS)
1. Examine how digital footprints are created and discuss the methods one can use to
delete or reduce these digital footprints.
2. Assess the effectiveness of safety measures like two-factor authentication in protecting
online accounts.
Ethics and Safety Measures in Computing 49

