Page 103 - TP_Prime_V2.2_Class7
P. 103

Evaluation Time

                 1.  Fill in the blanks using the hints given below:

                                  Network, Spamming, Ethical Hacking, Transaction, Patent


                     a.  Internet is a _____________ of interconnected computers.
 Prime (Ver. 2.2)-VII       c.   Some hackers use hacking for national security, creating safer systems, etc. This is known   CYBER SAFETY

                     b.   _____________ refers to the sending of bulk mail by an identified or unidentified source.

                        as _____________.

                     d.   Online _____________ fraud refers to the illegal withdrawing or transferring of money
                        from one bank account to another by a cybercriminal.

                     e.   _____________ is the right that gives an inventor the complete right to make, use, and
                        sell his or her work for a specific time period.

 100             2.  Short answer type questions.                                                                         101
                     a.  What is hacking?

                     b.  Give any two examples of intellectual property rights.
                     c.  Write two ways to stops cyberbullying.

                 3.  Long answer type questions.
                     a.  How E-mail Spoofing can be done?

                     b.  What are the ways to prevent cyberbullying?

                     c.  Describe the types of Online Transaction Frauds.
                     d.  What is Internet? Write any three disadvantages of it.
                                                                                        21 st
                 4.  Competency-based/Application-based questions.                    Century   #Critical Thinking
                                                                                        Skills
                       a.   Anju is got an email in her account. She is not sure whether the mail she has

                        received is genuine or spam. Help her in identifying the spam.

                       b.   Rajiv is exploring the Internet to prepare for his presentation. He wants to know whether
                        the websites he is exploring are secure or not. Suggest him a way.


                    Activity Time                                                                  21 st
                                                                                                 Century   #Critical Thinking
                                                                                                  Skills
                 Solve the crossword using the clues given below:

                     Across
                     1.   It is also called as network of networks.

                     2.  It is also called as Digital Dossier.
                     3.   It is the unauthorised access to computer system for the purpose of destroying the system

                        or stealing important information.
   98   99   100   101   102   103   104   105   106   107   108