Page 51 - Trackpad_ipro 4.1_Class7
P. 51
4. What is it called when electronic devices are used to harass or embarrass another person?
a. Hacking b. Cyberbullying
c. Spamming d. Social Networking
5. What is the validity period for a trademark?
a. 10 years b. 5 years
c. 15 years d. None of these
B. Write ‘T’ for true and ‘F’ for false.
1. A digital footprint is an impression a user leaves while using
the Internet. ................................
2. Always upload inappropriate content online. ................................
3. Keep your privacy settings always off. ................................
4. We should not use the content written by others without their
permission. ................................
5. We cannot delete the browsing history of a browser. ................................
C. Fill in the blanks using the words given below:
Hints
Phishing, Trademark, Plagiarism, Patent, Spam
1. ................................ is a symbol legally registered for use by a company.
2. ................................ is the practice of taking someone else's idea or creation without his/her
permission.
3. ................................ is the right that gives an inventor the complete right to make, use, and
sell his or her work for a specific time period.
4. ................................ is a cyber crime in which an e-mail that falsely claims to be from a trusted
organisation is sent to a user.
5. ................................ is an unwanted mail from a company for advertisement of their products,
also called bulk e-mail.
Let's Do It Section B (Subjective)
A. Short answer type questions.
1. Define software piracy.
...................................................................................................................................................................................
Ethics and Safety Measures in Computing 49

