Page 54 - iPlus_Ver_2.0_class_7
P. 54

5.  Which of the following statements is incorrect in context of plagiarism?

                         a. We can copy the content written by someone without his permission.

                         b. We can copy the content written by someone by taking his permission.

                         c. We can copy the content written by someone by giving citation.

                         d. We need to rephrase the content after copying.

                      6.  When someone sends e-mails that appear genuine from a trusted e-mail ID but in reality they're
                         not to be trusted, then it is called .................................
                         a. spamming                                     b. e-mail spoofing

                         c. phishing                                     d. None of these

                      7.  Online fraud refers to the illegal withdrawing or transferring of money from one bank account to
                         another by a cybercriminal.
                         a. IPR                                          b. Citation


                         c. Transaction                                  d. Both a and b
                  B.  Fill in the blanks using the words given below.

                                           Hints: Phishing, Cybercrimes, Internet, Patent, Spam

                      1.  ................................  is a hub of information.
                      2.  ................................  are offences that are committed using computers and smart devices.
                      3.  ................................ is the right that gives an inventor the complete right to make, use, and sell his or
                         her work for a specific time period.
                      4.  ................................ is  a cybercrime  in which an e-mail that  falsely claims  to be from a trusted
                         organisation is sent to a user.

                      5.  ................................ is also called bulk e-mail.
                  C.  Write ‘T’ for true and ‘F’ for false.
                      1.  A digital footprint is an impression a user leaves while walking.            ................................

                      2.  Always upload appropriate content online.                                    ................................
                      3.  Keep your privacy settings always on.                                        ................................
                      4.  We should use the content written by others without their permission.        ................................

                      5.  We cannot delete the browsing history of a browser.                          ................................

                                                        Section B (Subjective)
                  A.  Short answer type questions:
                      1.  Define Forum.
                      2.  What is easy communication?

                      3.  Give two measures to protect intellectual property rights.
                      4.  Write two ways to stop cyberbullying.
                      5.  What is computer ethics?



                    52
                         iPlus (Ver. 2.0)-VII
   49   50   51   52   53   54   55   56   57   58   59