0% found this document useful (0 votes)
1K views2 pages

Chapter-9: Cyber Ethics: Keywords. 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. A. Fill in The Blanks

This document discusses various topics related to cyber ethics including plagiarism, cyberbullying, hacking, intellectual property, spamming, and more. It provides definitions for key terms, identifies whether statements are true or false, asks application questions to test understanding, and requires selecting correct options or answering questions in detail. The goal is to educate on common ethical guidelines for computer use and how to avoid unethical behaviors online such as stealing information, invading privacy, spreading misinformation, using others' resources without permission, and various cybercrimes.

Uploaded by

Niyati
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
1K views2 pages

Chapter-9: Cyber Ethics: Keywords. 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. A. Fill in The Blanks

This document discusses various topics related to cyber ethics including plagiarism, cyberbullying, hacking, intellectual property, spamming, and more. It provides definitions for key terms, identifies whether statements are true or false, asks application questions to test understanding, and requires selecting correct options or answering questions in detail. The goal is to educate on common ethical guidelines for computer use and how to avoid unethical behaviors online such as stealing information, invading privacy, spreading misinformation, using others' resources without permission, and various cybercrimes.

Uploaded by

Niyati
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

Chapter-9: Cyber Ethics

Keywords.
1. Ethics
2. Plagiarism
3. Cyberbullying
4. Phishing
5. Hacking
6. Crackers
7. Spamming
8. Piracy
9. Patent
10. Copyright
11. Trademark
12. Digital Dossier/ Footprints
13. Clickjacking
14. Vishing
15. Cyberspionage
A. Fill in the blanks.
1. Computer Ethics
2. Citation
3. Cyber bullying
4. Hacking
5. Intellectual property

B. Write T for True and F for False.


1. True
2. False
3. False
4. True
5. False
C. Application-based questions.
1. If the e-mail is a spam mail, it cannot include genuine e-mail address in the TO: or CC: fields
or it may contain offensive language or links to websites with inappropriate content.
2. The URL of a secured website starts with https//: and your browser displays an icon of the
closed lock.
D. Select the correct option.
1. a) Spams 2. b) Cookie 3. b) Patent 4. b) Encryption 5. a) Phishing
E. Answer the following questions.
Ans.: 1. The common ethical guidelines which should be followed while using a computer: • Do
not use computer technology to steal information or to cause disruption or interference in
another users' work. • Do not spy on another person's computer data. • Do not contribute to
the spread of wrong information using computer technology. • Do not use someone else's
computer resources without an authorization.
Ans.: 2. Plagiarism is the usage or imitation of the language and thoughts of another person and
projected as one's own original work. Students should be encouraged to present their original
and innovative ideas. However, if material has to be taken from other sources, Citation is the
best way to avoid plagiarism. Material should be paraphrased and direct quotes should be
presented in quotation marks.
Ans.: 3. Some measures to protect intellectual property rights are, Patent your Inventions,
Copyright your Art and Publications, Register your Trademarks.
4. Write short notes on:
Ans.: a. Spamming-Spams are unwanted bulk e-mails that come from strange sources. Spams
are generally sent in large numbers for commercial advertising. Spam is a serious security
concern as it can be used to deliver Trojan Horses, Viruses, Worms, Spyware, and organise
targeted phishing attacks.
Ans.: b. Cracker: These are technical people, who are experts in breaking into systems, to steal
important data, such as financial details, or passwords, etc. Sometimes, they use key loggers for
this purpose.
Ans.: c. Digital footprint: It is an impression or information about a person that exists on the
internet because of his online activity.
Ans.: d. Software Piracy: When a software is copied and distributed illegally, it is called software
piracy.
Ans.: e. Hacking: It refers to an illegal intrusion into a computer system or network. It can cause
harm to computers by destroying data. Apart from this, they disturb applications by spreading
malwares and changing program logics and outputs
Ans.: f. Phishing: It is an act of sending an e-mail to a user, misleading him to believe that it is
from a trusted person or organisation, in an attempt to obtain sensitive information for
malicious purposes

You might also like