Page 103 - TP_Prime_V2.2_Class7
P. 103
Evaluation Time
1. Fill in the blanks using the hints given below:
Network, Spamming, Ethical Hacking, Transaction, Patent
a. Internet is a _____________ of interconnected computers.
Prime (Ver. 2.2)-VII c. Some hackers use hacking for national security, creating safer systems, etc. This is known CYBER SAFETY
b. _____________ refers to the sending of bulk mail by an identified or unidentified source.
as _____________.
d. Online _____________ fraud refers to the illegal withdrawing or transferring of money
from one bank account to another by a cybercriminal.
e. _____________ is the right that gives an inventor the complete right to make, use, and
sell his or her work for a specific time period.
100 2. Short answer type questions. 101
a. What is hacking?
b. Give any two examples of intellectual property rights.
c. Write two ways to stops cyberbullying.
3. Long answer type questions.
a. How E-mail Spoofing can be done?
b. What are the ways to prevent cyberbullying?
c. Describe the types of Online Transaction Frauds.
d. What is Internet? Write any three disadvantages of it.
21 st
4. Competency-based/Application-based questions. Century #Critical Thinking
Skills
a. Anju is got an email in her account. She is not sure whether the mail she has
received is genuine or spam. Help her in identifying the spam.
b. Rajiv is exploring the Internet to prepare for his presentation. He wants to know whether
the websites he is exploring are secure or not. Suggest him a way.
Activity Time 21 st
Century #Critical Thinking
Skills
Solve the crossword using the clues given below:
Across
1. It is also called as network of networks.
2. It is also called as Digital Dossier.
3. It is the unauthorised access to computer system for the purpose of destroying the system
or stealing important information.

