Page 50 - iPro_trackGPT_V5_Class7
P. 50

3.  ................................ refers to illegal activities conducted using computers or the Internet.

                      4.  ................................ is an illegal activity where hackers gain unauthorised access to systems.

                      5.  A ................................ is a symbol or word that identifies a company's product or brand.



                  C.  Write ‘T’ for true and ‘F’ for false.

                      1.  Unethical practices refer to actions that are considered morally wrong
                         or inappropriate, either for an individual, profession, or industry.         ................................

                      2.  Spamming involves sending unwanted emails to multiple users.                ................................

                      3.  A trademark lasts for 10 years and can be renewed to maintain brand
                         identity and protection.                                                     ................................

                      4.  Phishing emails come from trusted organisations asking for sensitive
                         information.                                                                 ................................

                      5.  Using someone’s documents without their permission is a violation of
                         computer ethics.                                                             ................................




                      Answer Arcade                                                             Section B (Subjective)



                  A.  Short answer type questions.

                      1.  What are digital footprints?

                         ...................................................................................................................................................................................

                         ...................................................................................................................................................................................

                      2.  Define phishing.


                         ...................................................................................................................................................................................

                         ...................................................................................................................................................................................

                      3.  What are computer ethics?

                         ...................................................................................................................................................................................

                         ...................................................................................................................................................................................

                      4.  How would you define spamming?

                         ...................................................................................................................................................................................


                         ...................................................................................................................................................................................




                    48     TrackGPT iPRO (V5.0)-VII
   45   46   47   48   49   50   51   52   53   54   55