COMPTUER ETHICS class VIII
CHAPTER 10
COMPTUER ETHICS
MCQ
1. Which of the following activities can be considered ethical?
1. C Protecting password
22. Which of the following defines illegal copying, distribution and use of a licensed software?
B. software piracy
33 Which is the term used when you use someone else's work and present it as your own?
B. Plagiarism
44. Which of these acts as a filter between you computer and internet
B. firewall
5 5. Which of the following is not a form of software piracy?
A. spamming
B fill in
the blanks
11. Computer ethics helps to distinguish between correct and incorrect actions.
22. Hacking means unauthorized access to
someone’s computer for viewing, copying or creating data on it.
33In a phishing attack, the pisher lures users via Emails to fake websites.
44. Spam is an unwanted email sent in bulk to a large number of users.
55 Digital Footprint is a trial of data that a user leaves behind while searching on the internet.
c. Match the following-
1. Using technology to harass another person online d. cyberbullying
2. Rights given to a creator over their content
c. copyright
3. Luring a user to a fake website e. Phishing
4. Accessing someone else's computer to steal information b. hacking
5. Leaving traces of personal information online
a. digital fooprint
SHORT QUESTION ANSWER
1. What do you understand by the term intellectual property rights?
1. Intellectual property rights are the rights
given to a person over their creation. IPR protects an individual’s or a
company’s ideas and creations, such as research work, product, art, logo,
trademark, registration etc.
2. What is renting?
2. Renting means lending or renting out software
without the permission of the license holder.
3. Differentiate between identity theft and phising.
3. Phishing refers
to the act of obtaining victims’ sensitive information by posing as trusted
companies and organizations. It is usually carried out through spoofed emails
and spoofed websites that urgently ask for various types of information.
Identity theft is the
illegal use of someone’s personal information for individual gain. Also known
as identity fraud, this type of theft can cost a victim time and money.
Identity thieves target information like names, dates of birth, driver’s
licenses, social security cards, insurance cards, credit cards, and bank
information. They use the stolen information to gain access to existing
accounts and open new accounts.
4. Define digital footprint.
4. Digital footprint refers to one’s
unique set of traceable digital activities, actions, contributions and
communications manifested on the internet or digital devices.
LONG ANSWERS
1. Explain computer ethics in brief. List four commandments of computer ethics.
1. Computer ethics are a set of moral principles
or rules that help to regulate the use of the computer. Four commandants of
computer ethics are as follows:-
i.
Never
use computer to harm others.
ii.
Never
interfere with other people’s work on the computer.
iii.
Don’t
look into files that others are working on.
iv.
Don’t
use computer to steal data or information.
2. Write four advantages and two disadvantages of the internet.
Chapter 6
Organising
and enhancing Webpages
1.
(C)
Number
2.
(a)
Reversed
3.
(d)
all of these
4.
(c)
<th>
5.
(d)
Image, Audio, video
(B) T/F
1. FALSE
2. FALSE
3. TRUE
4. FALSE
5. TRUE
C.
<OL> In an ordered list, the list items appear in a particular order. An
ordered list is a numbered list of items.
Attributes-
1. Type 2. Start
i.
The
type attributes gives the type of numbering to be used in the list. Type “a”
gives alphabetical order.
<ol type=”value”>
ii.
The
start attribute defines the start value for the ordered list numbers.
2. <UL>
tag is a container tag. It is use to display list of item with bulleted style.
Its attribute help us to change the different type of list.
Attribute-
Type
3.
<TH> tag is a container element that is used to specify row headings in
the table.
Attribute- 1. ID 2. STYLE
3. ALIGN 4.
BGCOLOR
4. <A>
The <a>…….</a> element is used to create a hyperlink. The href
attribute is used with the <a> tag to specify the URL of the location to
be linked.
<a
href=”url”> text </a>
6.
<audio>
Attribute- controls
An audio can be inserted
using the <audio>..</audio> element. The controls attribute is used
to display audio controls such as play, pause and volume buttons.
7.
<Video>
Attribute- controls
An audio can be inserted
using the
< Video >..</ Video
> element. The controls attribute is used to display Video controls such as
play, pause and volume buttons.
Short answer questions
1.
Attributes
required to build an ordered list:-
1.
Type 2. Start
2. Tags used to create a definition list
a. Definition list <DL>
b. Definition list item <DT>
C. Definition list description
<DD>
3. Tags used
to create a table in HTML –
1. <TABLE>……</TABLE>
2.
<TR>…<TR>
3.
<TD>..</TD>
4.
<CAPTION>…….</CAPTION>
5.
<TH> ……..</TH>
ANS 4.
Attributes of <TD> AND <TH> Tags are ROWSPAN COLSPAN
ANS5.
Following are the three types of hyperlinks
1.
Internal-
Links on the same page
2.
Local-
Links to another page within the same website
3.
Global-
Links to pages on different websites.
Long answer questions-
ANS1. Already done
ANS2. A list is a number
of similar items that are presented in a particular way mostly one below the
other. A list helps organize data in a specific order so that the data becomes
easy to read and understand.
Ans 4. A
list inside another list is known as a nested list. Nested list are useful when
subcategories of the items to be listed.
Example-
<html>
<head>
<title> nested list
</title>
<head>
<body>
<ol>
<li> Monday </li>
<ul>
<li> English </li>
<li> Mathematics </li>
</ul>
<li> Tuesday </li>
</ol>
</body>
</html>
ANS4. Four Tags required to create a
table are (PAGE 89)
1. <Table> Tag
2. <Tr> Tag
3. <Td> Tag
4. <Th> Tag
ANS5. A website consists of multiple
webpages. These webpages are linked to each other through hyperlinks. A
hyperlink can be a text or an image that links to another location on the
computer or the internet. When clicked, a hyperlink takes to another location
in the same or a different webpage.
Syntax- < a href=”url”> text
</a>
ANS6. Audio
Syntax- <audio controls>
< source src=”URL”>
</audio>
Video
Syntax-
<Video controls>
< source src=”URL”>
</video>
Thankyou sir
ReplyDelete