Page 104 - TP_Prime_V2.2_Class7
P. 104
5. The person who breaks into the computer system for stealing important information.
Down
4. It is a symbol or word legally registered or established and used as representing a company
or a product.
6. It is the use of electronic media such as smartphones, computers and tablets to harass or
attack a person. 6
Prime (Ver. 2.2)-VII 1 4 CYBER SAFETY
R
2 D R
102 PB
3 A
5 K
G
SDG Activity
Your friend is a "Cyber Safety Ambassador," educating local shopkeepers
and small business owners about safe online practices, responsible use of
technology, and the importance of protecting their digital data. Explain how
this small initiative contributes to economic growth by ensuring a safer digital
environment for businesses.
21 st
In the Lab Century #Creativity
Skills #Leadership & Responsibility
• Create a presentation on the topic 'Unethical Practices'.
• Create a report on types of Intellectual Property Rights in MS Word.

