Page 134 - TrackpadV5.1_class7
P. 134

b.  Which of the following acts refers to sending unwanted e-mails repeatedly?

                         (i)  Phishing                                (ii)  Hacking
                        (iii)  Spamming                              (iv)  Plagiarism

                     c.  How does the illegal practice of obtaining sensitive information via emails work?

                         (i)  Phishing                                (ii)  Spamming
                        (iii)  Hacking                               (iv)  Piracy

                     d.  Which year did the National Cyber Security Policy come into effect in India?

                         (i)  2000                                    (ii)  2008
                        (iii)  2013                                  (iv)  2015

                     e.  How can individuals manage or clear their traceable activities after surfing the Internet?
                         (i)  Cyber crime                             (ii)  Digital footprints

                        (iii)  Intellectual property                 (iv)  Malware

                  2.  Fill in the blanks using the words from the help box.


                                            Spamming, 2008, Software piracy, Phishing

                     a.   The illegal practice of obtaining sensitive information through e-mails is known as  ____________.

                     b.  The act of repeatedly sending unwanted e-mails to a large number of recipients is called ____________.

                     c.  Unauthorised copying or stealing of software is known as  ____________.

                     d.  The Information Technology Amendment Act was enacted in the year  ____________.

                  3.  Write 'T' for true and 'F' for false.

                     a.  Cyber security aims to protect only financial information.

                     b.  Phishing involves sending legitimate offers and rewards via e-mails.


                     c.  Digital footprints can be used by law enforcement agencies to track offenders.

                     d.  Plagiarism is considered academic dishonesty and literary theft.

                     e.  The Information Technology Act, 2000 provides legal recognition to all
                        e-transactions.


                  4.  Answer in one or two words.
                     a.  What is the act of intruding into a computer system for harmful purposes called?  _______________
                     b.  What is the term for unwanted e-mails sent repeatedly?                       _______________

                     c.  What are the exclusive rights given by the government to protect intellectual
                        creations called?                                                             _______________






                  132   Pro (V5.1)-VII
   129   130   131   132   133   134   135   136   137   138   139