computer ethics class 8

 CHAPTER 10

COMPTUER ETHICS

MCQ

11. C Protecting password

22. B. software piracy

33. B. Plagiarism

44.B. firewall

55.A. spamming

B fill in the blanks

1. Computer ethics

2. Hacking means unauthorized access to someone’s computer for viewing, copying or creating data on it.

3. Emails

4. Spamming

5. Footprint

c. Match the following-

1.      d. cyberbullying

2.      c. copyright

3.      e. Phishing

4.       b. hacking

5.       a. digital fooprint

 

SHORT QUESTION ANSWER

1.  Intellectual property rights are the rights given to a person over their creation. IPR protects an individual’s or a company’s ideas and creations, such as research work, product, art, logo, trademark, registration etc.

 

2.  Renting means lending or renting out software without the permission of the license holder.

3. Phishing refers to the act of obtaining victims’ sensitive information by posing as trusted companies and organizations. It is usually carried out through spoofed emails and spoofed websites that urgently ask for various types of information.

Identity theft is the illegal use of someone’s personal information for individual gain. Also known as identity fraud, this type of theft can cost a victim time and money. Identity thieves target information like names, dates of birth, driver’s licenses, social security cards, insurance cards, credit cards, and bank information. They use the stolen information to gain access to existing accounts and open new accounts.

4. Digital footprint refers to one’s unique set of traceable digital activities, actions, contributions and communications manifested on the internet or digital devices.

 

 

 

 

 

LONG ANSWERS

1.  Computer ethics are a set of moral principles or rules that help to regulate the use of the computer. Four commandants of computer ethics are as follows:-

i.                 Never use computer to harm others.

ii.              Never interfere with other people’s work on the computer.

iii.          Don’t look into files that others are working on.

iv.           Don’t use computer to steal data or information.

ANS2. 1. Provide information on every topic.
2. Online shopping

3. 




Comments

Popular posts from this blog

ORGANISING AND ENCANCING WEBPAGES CLASS VIII

INTERENT BASICS multiple choice questions 16 AUG 2023