COMPTUER ETHICS class VIII

 

 

CHAPTER 10

COMPTUER ETHICS

MCQ

1. Which of the following activities can be considered ethical?

1. C Protecting password


22. Which of the following defines illegal copying, distribution and use of a licensed software?

   B. software piracy

33 Which is the term used when you use someone else's work and present it as your own?

  B. Plagiarism

44. Which of these acts as a filter between you computer and internet

      B. firewall

5 5. Which of the following is not a form of software piracy?

     A. spamming

B fill in the blanks

11. Computer ethics helps to distinguish between correct and incorrect actions.

22. Hacking means unauthorized access to someone’s computer for viewing, copying or creating data on it.

33In a phishing attack, the pisher lures users via Emails to fake websites.

44. Spam is an unwanted email sent in bulk to a large number of users.

55 Digital Footprint is a trial of data that a user leaves behind while searching on the internet.

c. Match the following-

1.   Using technology to harass another person online  d. cyberbullying

2. Rights given to a creator over their content

      c. copyright

3. Luring a user to a fake website     e. Phishing

4.   Accessing someone else's computer to steal information    b. hacking

5. Leaving traces of personal information online

      a. digital fooprint

 

SHORT QUESTION ANSWER

     1. What do you understand by the term intellectual property rights?

1.  Intellectual property rights are the rights given to a person over their creation. IPR protects an individual’s or a company’s ideas and creations, such as research work, product, art, logo, trademark, registration etc.

 

2. What is renting?

2.  Renting means lending or renting out software without the permission of the license holder.

3. Differentiate between identity theft and phising.

3. Phishing refers to the act of obtaining victims’ sensitive information by posing as trusted companies and organizations. It is usually carried out through spoofed emails and spoofed websites that urgently ask for various types of information.

Identity theft is the illegal use of someone’s personal information for individual gain. Also known as identity fraud, this type of theft can cost a victim time and money. Identity thieves target information like names, dates of birth, driver’s licenses, social security cards, insurance cards, credit cards, and bank information. They use the stolen information to gain access to existing accounts and open new accounts.

4. Define digital footprint.

4. Digital footprint refers to one’s unique set of traceable digital activities, actions, contributions and communications manifested on the internet or digital devices.

 

 

 

 

 

LONG ANSWERS

1. Explain computer ethics in brief. List four commandments of computer ethics.

1.  Computer ethics are a set of moral principles or rules that help to regulate the use of the computer. Four commandants of computer ethics are as follows:-

i.                 Never use computer to harm others.

ii.              Never interfere with other people’s work on the computer.

iii.          Don’t look into files that others are working on.

iv.           Don’t use computer to steal data or information.

2. Write four advantages and two disadvantages of the internet.




3. Write five guidelines to prevent cybercrime.

Ans3. 1 Install and update antivirus software regularly.

2. Do not respond to an email that asks for personal information.

3. Choose strong password. Avoid storing passwords on web browsers.

4. Log out of online account properly.

Q4. Explain the following terms-

1. Copyright-Copyright is the legal right given to an intellectual property owner. As the term suggests, it is the right to copy. Thus, copyright meaning is that when a person creates a product, they own the right to it. So, only that individual can have the exclusive right to reproduce that work or anyone they give authorization to. Copyright law grants the original creators of the product an exclusive right to use it further or duplicate the product for a specific time.

2. Software piracy- Software Piracy is the illegal approach of copying, distributing, modifying, selling, or using software that is legally protected. So in a simple term, we can say Software piracy is the act of stealing legal software.

3. Soft lifting-Softlifting is the act of purchasing a single copy of software and then downloading it onto more than one computer, despite agreement terms stating the software must only be downloaded once. Softlifting does not involve selling copies of protected creative works.

4. Hacking- Hacking refers to the act of manipulating or gaining unauthorized access to a computer system, network, or digital device with or without malicious intent. It involves exploiting weaknesses in system security to disrupt functions or gather sensitive information.

 

Chapter 6

Organising and enhancing Webpages

1.           (C) Number

2.           (a) Reversed

3.           (d) all of these

4.           (c) <th>

5.           (d) Image, Audio, video

 

(B) T/F

1. FALSE

2. FALSE

3. TRUE

4. FALSE

5. TRUE

 

C. <OL> In an ordered list, the list items appear in a particular order. An ordered list is a numbered list of items.

Attributes- 1. Type   2. Start

    i.                        The type attributes gives the type of numbering to be used in the list. Type “a” gives alphabetical order.

<ol type=”value”>

ii.                        The start attribute defines the start value for the ordered list numbers.

 

2. <UL> tag is a container tag. It is use to display list of item with bulleted style. Its attribute help us to change the different type of list.

Attribute- Type

3. <TH> tag is a container element that is used to specify row headings in the table.

Attribute-  1. ID    2. STYLE

                  3. ALIGN   4. BGCOLOR

4. <A> The <a>…….</a> element is used to create a hyperlink. The href attribute is used with the <a> tag to specify the URL of the location to be linked.

<a href=”url”> text </a>

6.           <audio>

Attribute- controls

An audio can be inserted using the <audio>..</audio> element. The controls attribute is used to display audio controls such as play, pause and volume buttons.

7.           <Video>

Attribute- controls

An audio can be inserted using the

< Video >..</ Video > element. The controls attribute is used to display Video controls such as play, pause and volume buttons.

 

Short answer questions

1.           Attributes required to build an ordered list:-

1.           Type   2. Start

2.  Tags used to create a definition list

         a. Definition list <DL>

         b. Definition list item <DT>

        C. Definition list description <DD>

3. Tags used to create a table in HTML –

 1. <TABLE>……</TABLE>

2. <TR>…<TR>

3. <TD>..</TD>

4. <CAPTION>…….</CAPTION>

5. <TH> ……..</TH>

 

ANS 4. Attributes of <TD> AND <TH> Tags are ROWSPAN   COLSPAN

ANS5. Following are the three types of hyperlinks

1.           Internal- Links on the same page

2.           Local- Links to another page within the same website

3.           Global- Links to pages on different websites.

 

Long answer questions-

ANS1. Already done

ANS2. A list is a number of similar items that are presented in a particular way mostly one below the other. A list helps organize data in a specific order so that the data becomes easy to read and understand.

 

Ans 4. A list inside another list is known as a nested list. Nested list are useful when subcategories of the items to be listed.

Example-

<html>

<head>

<title> nested list </title>

<head> 

<body>

<ol>

<li> Monday </li>

<ul>

<li> English </li>

<li> Mathematics </li>

</ul>

<li> Tuesday </li>

</ol>

</body>

</html>

 

ANS4. Four Tags required to create a table are   (PAGE 89)

1.   <Table> Tag

2.   <Tr> Tag

3.   <Td> Tag

4.   <Th> Tag

 

 

ANS5. A website consists of multiple webpages. These webpages are linked to each other through hyperlinks. A hyperlink can be a text or an image that links to another location on the computer or the internet. When clicked, a hyperlink takes to another location in the same or a different webpage.

Syntax- < a href=”url”> text </a>

 

ANS6. Audio

Syntax- <audio controls>

< source src=”URL”>

</audio>

 

Video

Syntax-

<Video controls>

< source src=”URL”>

</video>

 

Comments

Post a Comment

Popular posts from this blog

CLASS 8 PRACTICAL PAPER

HTML FORMS

Organising and enhancing Webpages CLASS VIII