Satya Prakash Public School
Class 7th
                                    Ch:10 Cyber Safety
A. Fill in the blanks :
   1.   Computer ethics
   2.   Citation
   3.   Cyber bulling
   4.   Hacking
   5.   Intellectual property
B. State True or false
1.Spam are unwanted bulk e-mail that come from strange sources. True
2. Hacking is the usage or imitation of the language and thoughts of another person and
projecting them as ons’s own original work. False
3. you can identify the unsecured websites by looking at the lock sign or https on the address bar.
True
4. Encryption is the process of transforming data into an unreadable code. True
5. A patent grants the inventor the sole right to make , use and sell that invention for an unlimited
period. False.
C. Application Based questions
   1. To check To: or CC: field in the email address.
   2. The unsecured websites by looking at the lock sign or https on the address bar.
D. MCQs
   1.   Spams
   2.   Cookies
   3.   Copyright
   4.   Encryption
   5.   Phishing
E. Answer the following questions
Q1. What are the advantages of the internet?
    Advantages of the Internet are :
    1) Communication        Forum.     One of      the top     benefits of     the   internet is
       communication. Internet technology has allowed people and businesses to communicate
    2) Abundant Information.
    3) Inexhaustible Education.
    4) Entertainment for Everyone.
    5) Online Services.
    Q2. Write any four ethical guide line which should be followed while using a computer?
    A. Four ethical guide line which should be followed while using a computer are:
    1) Do not spy on another persons computer.
    2)Do not contribute to spread of wrong information.
    3)do not claim ownership on a work which is the output of someone else intellect.
    4)Avoid buying pirated software.
    Q3 Define Plagiarism ? write a steps can be taken to prevent it.
    A. Plagiarism is presenting someone else’s work or ideas as your own,
        or
        The practice of taking someone else's work or ideas and passing them off as one's own:
        write a steps can be taken to prevent it are :
       1.    Keep track of the sources you consult in your research.
       2.    Paraphrase or quote from your sources (and add your own ideas).
       3.    Credit the original author in an in-text citation and reference list.
       4.    Use a plagiarism checker before you submit.
    Q4. How can you protect your intellectual property right from getting violated?
    Here are five different ways to protect your intellectual property.
    1. Register copyrights, trademarks, and patents
    2. Register business, product or domain names
    3. Create confidentiality, non-disclosure or licensing contracts for employees and partners
    4. Implement security measures :These may include:
•     setting up password protection for all computer networks
    •      encrypting data, especially since files are shared within the company’s IT system
    •      using virtual private network access (VPN)
    •      establishing Wi-Fi Protected Access 2 (WPA2)
        5. Avoid joint ownership
        Q5. Why Software Piracy is a danger?
        Why Software Piracy is a danger because:
        • Many times it fails or malfunction.
        • No warranty of the product as it is acquired by illegal way.
        • Risk of security issues.
        • No upgrade and improvement in features and functionality
        • High risk of virus and malware infection to the computer.
        F.. Write a short note on
•       Spamming: Spamming is the use of messaging systems to send multiple unsolicited messages
        (spam) to large numbers of recipients for the purpose of commercial advertising, for the purpose
        of non-commercial proselytizing, for any prohibited purpose (especially the fraudulent purpose
        of phishing), or simply sending the same message over and over to the same user.
•       Cybercrime : Any offenses committed against individuals or groups of individuals to harm the
        reputation or cause physical or mental trauma through electronic means can be defined as
        Cybercrime.
•       Firewall: A firewall is a network security device that monitors incoming and outgoing network
        traffic and decides whether to allow or block specific traffic based on a defined set of security
        rules. An early type of firewall device, a proxy firewall serves as the gateway from one network
        to another for a specific application.
•       Software Piracy : Software Piracy is the illegal approach of copying, distributing, modifying,
        selling, or using the software which is legally protected. So in a simple term, we can say
        Software piracy is the act of stealing legal software in an illegal way. This software piracy
        refers to the unauthorized copy and use of legal software.
•       Softlifting-
        It is the most common type of software piracy. In this piracy, the legal owner of the software is
        one, but the users are multiple. For instance, someone purchases the genuine software, and
        others will illegally use that software by downloading the software to their computer.
•       Hacking: Hacking is refers to illegal intrusion into a computer system or network.
•       Phishing: Phishing is an act of sending an email to a user, misleading him to believe that it is
        form a trusted person or organization , in an attempt to obtain sensitive information for malicious
        purpose.