Chapter-9: Cyber Ethics
A. Fill in the blanks.
1. Computer Ethics
2. Citation
3. Cyber bullying
4. Hacking
5. Intellectual property
B. Write T for True and F for False.
1. True
2. False
3. False
4. True
5. False
C. Application-based questions.
1. If the e-mail is a spam mail, it cannot include genuine e-mail address in the TO: or CC: fields
or it may contain offensive language or links to websites with inappropriate content.
2. The URL of a secured website starts with https//: and your browser displays an icon of the
closed lock.
D. Select the correct option.
1. a) Spams
2. b) Cookie
3. b) Copyright
4. b) Encryption
5. a) Phishing
E. Answer the following questions.
1. List any 4 ethical guidelines that should be followed while using a computer.
The common ethical guidelines which should be followed while using a computer:
• Do not use computer technology to steal information or to cause disruption or
interference in another users' work.
• Do not spy on another person's computer data.
• Do not contribute to the spread of wrong information using computer technology.
• Do not use someone else's computer resources without an authorization.
2. Define plagiarism. What steps can be taken to prevent it?
Plagiarism is the usage or imitation of the language and thoughts of another person and
projected as one's own original work. Students should be encouraged to present their original
and innovative ideas. However, if material has to be taken from other sources, Citation is the
best way to avoid plagiarism. Material should be paraphrased and direct quotes should be
presented in quotation marks.
3. How can you protect the intellectual Property Rights from getting violated?
Some measures to protect intellectual property rights are, Patent your Inventions,
Copyright your Art and Publications, Register your Trademarks.
4. Write short notes on:
a. Spamming-Spams are unwanted bulk e-mails that come from strange sources. Spams are
generally sent in large numbers for commercial advertising. Spam is a serious security
concern as it can be used to deliver Trojan Horses, Viruses, Worms, Spyware, and organise
targeted phishing attacks.
b. Cracker: These are technical people, who are experts in breaking into systems, to steal
important data, such as financial details, or passwords, etc. Sometimes, they use key
loggers for this purpose.
c. Digital footprint: It is an impression or information about a person that exists on the
internet because of his online activity.
d. Software Piracy: When a software is copied and distributed illegally, it is called
software piracy.
e. Hacking: It refers to an illegal intrusion into a computer system or network. It can cause harm
to computers by destroying data. Apart from this, they disturb applications by spreading
malwares and changing program logics and outputs
f. Phishing: It is an act of sending an e-mail to a user, misleading him to believe that it is from a
trusted person or organisation, in an attempt to obtain sensitive information for malicious
purposes.
******************************************