Page 55 - iPlus_Ver_2.0_class_7
P. 55

B.  Long answer type questions:
                     1.  Write the difference between a patent and a trademark.

                     2.  Write any three advantages and disadvantages of Internet.
                     3.  Write any three protective measures to avoid plagiarism.
                     4.  Write the Indian laws and government initatives that enforce cybersecurity.

                 C.  Competency-based/Application-based questions:
                     1.  Anju received an email in her inbox. She is not sure whether the mail she has received is genuine
                        or spam. Help her in identifying the spam.

                     2.  Rajiv is exploring the Internet to prepare for his presentation. He wants to know whether the websites
                        which he is exploring are secure or not. Suggest him to find out the way in which he can clarify.


                                                                                     #Problem Solving & Logical Reasoning
                          Crack The Code                                             #Digital Literacy



                  Solve the crossword using the clues given below.
                      Across
                      1.  It is also called a network of networks.
                      2.  It is also called a Digital Dossier.
                      3.  It  is an  act  of  gaining  the  unauthorised  access to  a  computer  system for  the  purpose  of
                         destroying the system or stealing important information.
                      5.  The person who breaks into the computer system to steal important information.
                      Down
                      4.  It is a symbol or word legally registered or established and used to represent a company or a
                         product.
                      6.  It is the use of electronic media such as smartphones, computers, and tablets to harass or
                         attack a person.                                                         6

                                             4


                         1                    R



                                          2   D                                                    R






                                      3       A



                             5                K





                                                                                                  G




                                                                                                                  53
                                                                         Ethics and Safety Measures in Computing
   50   51   52   53   54   55   56   57   58   59   60