Page 53 - Trackpad_ipro 4.1_Class7
P. 53

#Coding and Computational Thinking
                 Higher Order Thinking Skills (HOTS)
                                                                                   #Ethical & Moral Reasoning
                    1.   Should an individual share personal details like their month of birth, year of birth, and
                       mother's maiden name to activate subscriptions to free services? Why or why not? Discuss
                       the potential risks of sharing such information.

                    2.   What does it mean when targeted ads appear based on private conversations or activities?
                       Explain the implications of such a digital presence and how it may affect privacy.



                  Crack The             Code                                      #Problem Solving & Logical Reasoning
                                                                                  #Ethical & Moral Reasoning


                 Solve the crossword using the clues given below:
                     Across

                     1.  It is also called a network of networks.
                     2.  It is also called a digital dossier.

                     3.  It is an act of gaining the unauthorised access to a computer system for the purpose of
                        destroying the system or stealing important information.
                     5.  It is a person who breaks into the computer system to steal important information.
                     Down

                     4.  It is a symbol or word legally registered or established and used to represent a company
                        or a product.
                     6.  It is the use of electronic media such as smartphones, computers, and tablets to harass or
                        attack a person.
                                                                                                 6

                                          4



                    1                     R



                                      2   D                                                      R






                                  3       A



                        5                 K






                                                                                                 G




                                                                        Ethics and Safety Measures in Computing  51
   48   49   50   51   52   53   54   55   56   57   58