Page 51 - Trackpad_ipro 4.1_Class7
P. 51

4.  What is it called when electronic devices are used to harass or embarrass another person?

                        a. Hacking                                        b. Cyberbullying
                        c. Spamming                                       d. Social Networking


                     5.  What is the validity period for a trademark?

                        a. 10 years                                       b. 5 years
                        c. 15 years                                       d. None of these


                 B.  Write ‘T’ for true and ‘F’ for false.
                     1.  A digital footprint is an impression a user leaves while using
                        the Internet.                                                                ................................

                     2.  Always upload inappropriate content online.                                 ................................

                     3.  Keep your privacy settings always off.                                      ................................

                     4.  We should not use the content written by others without their
                        permission.                                                                  ................................
                     5.  We cannot delete the browsing history of a browser.                         ................................

                 C.  Fill in the blanks using the words given below:

                                           Hints


                                               Phishing, Trademark, Plagiarism, Patent, Spam

                     1.  ................................ is a symbol legally registered for use by a company.

                     2.  ................................ is the practice of taking someone else's idea or creation without his/her
                        permission.

                     3.  ................................ is the right that gives an inventor the complete right to make, use, and
                        sell his or her work for a specific time period.

                     4.  ................................ is a cyber crime in which an e-mail that falsely claims to be from a trusted
                        organisation is sent to a user.

                     5.  ................................ is an unwanted mail from a company for advertisement of their products,
                        also called bulk e-mail.




                  Let's Do            It                                                    Section B (Subjective)



                 A.  Short answer type questions.
                     1.  Define software piracy.

                        ...................................................................................................................................................................................



                                                                        Ethics and Safety Measures in Computing  49
   46   47   48   49   50   51   52   53   54   55   56