Class VIII Chapter 10 Computer Ethics
Class VIII Chapter 10 Computer Ethics
2. Write any five rules that should be followed while using a computer.
Answer:
Keep Personal Information Professional and Limited.
Keep Your Privacy Settings On.
Practice Safe Browsing.
Make Sure Your Internet Connection is Secure.
Be Careful What You Download.
Choose Strong Passwords.
Make Online Purchases from Secure Sites.
(b) Cyberbullying.
Answer:
Cyberbullying is bullying that takes place over digital devices like cell phones,
computers, and tablets. Cyberbullying can occur through SMS, Text, and apps, or online
in social media, forums, or gaming where people can view, participate in, or share
content.
CLASS-VIII-COMPUTER Page 1
Class-VIII-Chapter 10 - Computer Ethics
(c) Phishing.
Answer:
Phishing is a type of social engineering attack often used to steal user data, including
login credentials and credit card numbers. It occurs when an attacker, masquerading as
a trusted entity, dupes a victim into opening an email, instant message, or text message.
(d) Spamming.
Answer:
Spamming is when one person or company sends an unwanted email to another
person. Spam emails are the computer version of unwanted "junk mail" that arrives in a
mailbox, such as advertising pamphlets and brochures.
CLASS-VIII-COMPUTER Page 2
Class-VIII-Chapter 10 - Computer Ethics
CLASS-VIII-COMPUTER Page 3