Page 53 - iPlus_Ver_2.0_class_7
P. 53

Information Technology Amendment Act, 2008

                 This law aims to protect data privacy and information security. It validates digital signatures and
                 contracts. According to this act, the owner of a given IP address will be held responsible for the
                 content accessed or distributed through it.

                 National Cybersecurity Policy, 2013

                 It is a policy in India that aims to protect public and private infrastructure from cyber-attacks and
                 safeguards personal, financial, and banking information.





                    To Sum Up


                         The  Internet is also called "the  NET" or  "Network  of Networks",   which  means
                        International Network.
                         Computer ethics are the common guidelines that we need to follow while using the
                        computer.
                         Internet ethics are the good practices that one should follow while using the Internet.
                         An action which is not considered morally right or good for a person, a profession, or
                        an industry is an unethical practice.





                                                           Exercise


                                                       Section A (Objective)
                 A.  Tick (3) the correct option.
                     1.  A digital footprint is also known as .................................

                        a. digital diary                                b. digital dossier

                        c. database                                     d. None of these
                     2.  Why do hackers break into the others’ computer system?

                        a. To steal important data                      b. To protect the system

                        c. Both a and b                                 d. None of these
                     3.  Use of the electronic devices to harass or embarrass others is called .................................

                        a. hacking                                      b. spamming

                        c. cyberbullying                                d. social networking

                     4.  Which type of cybercrime is referred to sending of bulk mail by an identified or unidentified source?
                        a. Hacking                                      b. Spamming

                        c. Phishing                                     d. None of these




                                                                                                                  51
                                                                         Ethics and Safety Measures in Computing
   48   49   50   51   52   53   54   55   56   57   58