Tuesday, November 15, 2022

COMPTUER ETHICS class VIII

 

 

CHAPTER 10

COMPTUER ETHICS

MCQ

1. C Protecting password

2. B. software piracy

3. B. Plagiarism

4. B. firewall

5. A. spamming

B fill in the blanks

1. Computer ethics

2. Hacking means unauthorized access to someone’s computer for viewing, copying or creating data on it.

3. Emails

4. Spamming

5. Footprint

c. Match the following-

1.      d. cyberbullying

2.      c. copyright

3.      e. Phishing

4.       b. hacking

5.       a. digital fooprint

 

SHORT QUESTION ANSWER

1.  Intellectual property rights are the rights given to a person over their creation. IPR protects an individual’s or a company’s ideas and creations, such as research work, product, art, logo, trademark, registration etc.

 

2.  Renting means lending or renting out software without the permission of the license holder.

3. Phishing refers to the act of obtaining victims’ sensitive information by posing as trusted companies and organizations. It is usually carried out through spoofed emails and spoofed websites that urgently ask for various types of information.

Identity theft is the illegal use of someone’s personal information for individual gain. Also known as identity fraud, this type of theft can cost a victim time and money. Identity thieves target information like names, dates of birth, driver’s licenses, social security cards, insurance cards, credit cards, and bank information. They use the stolen information to gain access to existing accounts and open new accounts.

4. Digital footprint refers to one’s unique set of traceable digital activities, actions, contributions and communications manifested on the internet or digital devices.

 

 

 

 

 

LONG ANSWERS

1.  Computer ethics are a set of moral principles or rules that help to regulate the use of the computer. Four commandants of computer ethics are as follows:-

i.                 Never use computer to harm others.

ii.              Never interfere with other people’s work on the computer.

iii.          Don’t look into files that others are working on.

iv.           Don’t use computer to steal data or information.

ANS2. 1. Provide information on every topic.
2. Online shopping

3. 



 

 

 

Chapter 6

Organising and enhancing Webpages

1.           (C) Number

2.           (a) Reversed

3.           (d) all of these

4.           (c) <th>

5.           (d) Image, Audio, video

 

(B) T/F

1. FALSE

2. FALSE

3. TRUE

4. FALSE

5. TRUE

 

C. <OL> In an ordered list, the list items appear in a particular order. An ordered list is a numbered list of items.

Attributes- 1. Type   2. Start

    i.                        The type attributes gives the type of numbering to be used in the list. Type “a” gives alphabetical order.

<ol type=”value”>

ii.                        The start attribute defines the start value for the ordered list numbers.

 

2. <UL> tag is a container tag. It is use to display list of item with bulleted style. Its attribute help us to change the different type of list.

Attribute- Type

3. <TH> tag is a container element that is used to specify row headings in the table.

Attribute-  1. ID    2. STYLE

                  3. ALIGN   4. BGCOLOR

4. <A> The <a>…….</a> element is used to create a hyperlink. The href attribute is used with the <a> tag to specify the URL of the location to be linked.

<a href=”url”> text </a>

6.           <audio>

Attribute- controls

An audio can be inserted using the <audio>..</audio> element. The controls attribute is used to display audio controls such as play, pause and volume buttons.

7.           <Video>

Attribute- controls

An audio can be inserted using the

< Video >..</ Video > element. The controls attribute is used to display Video controls such as play, pause and volume buttons.

 

Short answer questions

1.           Attributes required to build an ordered list:-

1.           Type   2. Start

2.  Tags used to create a definition list

         a. Definition list <DL>

         b. Definition list item <DT>

        C. Definition list description <DD>

3. Tags used to create a table in HTML –

 1. <TABLE>……</TABLE>

2. <TR>…<TR>

3. <TD>..</TD>

4. <CAPTION>…….</CAPTION>

5. <TH> ……..</TH>

 

ANS 4. Attributes of <TD> AND <TH> Tags are ROWSPAN   COLSPAN

ANS5. Following are the three types of hyperlinks

1.           Internal- Links on the same page

2.           Local- Links to another page within the same website

3.           Global- Links to pages on different websites.

 

Long answer questions-

ANS1. Already done

ANS2. A list is a number of similar items that are presented in a particular way mostly one below the other. A list helps organize data in a specific order so that the data becomes easy to read and understand.

 

Ans 4. A list inside another list is known as a nested list. Nested list are useful when subcategories of the items to be listed.

Example-

<html>

<head>

<title> nested list </title>

<head> 

<body>

<ol>

<li> Monday </li>

<ul>

<li> English </li>

<li> Mathematics </li>

</ul>

<li> Tuesday </li>

</ol>

</body>

</html>

 

ANS4. Four Tags required to create a table are   (PAGE 89)

1.   <Table> Tag

2.   <Tr> Tag

3.   <Td> Tag

4.   <Th> Tag

 

 

ANS5. A website consists of multiple webpages. These webpages are linked to each other through hyperlinks. A hyperlink can be a text or an image that links to another location on the computer or the internet. When clicked, a hyperlink takes to another location in the same or a different webpage.

Syntax- < a href=”url”> text </a>

 

ANS6. Audio

Syntax- <audio controls>

< source src=”URL”>

</audio>

 

Video

Syntax-

<Video controls>

< source src=”URL”>

</video>

 

1 comment:

ONLINE SAFETY QUIZ FOR ALL CLASSES

https://www.safekids.com/quiz/  https://www.nspcc.org.uk/keeping-children-safe/online-safety/quiz/ https://edu.gcfglobal.org/en/internetsafe...