0% found this document useful (0 votes)
98 views3 pages

Class VIII Chapter 10 Computer Ethics

The document discusses computer ethics, which encompasses moral principles and practices regulating computer use, emphasizing ethical implementation of technology. It outlines rules for safe computer usage, defines key concepts like plagiarism, cyberbullying, phishing, and spamming, and explains intellectual property rights and cybercrime. Overall, it highlights the importance of ethical behavior in the digital realm.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
98 views3 pages

Class VIII Chapter 10 Computer Ethics

The document discusses computer ethics, which encompasses moral principles and practices regulating computer use, emphasizing ethical implementation of technology. It outlines rules for safe computer usage, defines key concepts like plagiarism, cyberbullying, phishing, and spamming, and explains intellectual property rights and cybercrime. Overall, it highlights the importance of ethical behavior in the digital realm.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

Class-VIII-Chapter 10 - Computer Ethics

Answer the following questions:


1. What is computer ethics?
Answer:
Computer ethics is a set of procedures, moral principles and ethical practices that
regulates the use of computer. It focuses on ethical implementation and use of
computing resources and includes new issues that are raised by new technologies.

2. Write any five rules that should be followed while using a computer.
Answer:
 Keep Personal Information Professional and Limited.
 Keep Your Privacy Settings On.
 Practice Safe Browsing.
 Make Sure Your Internet Connection is Secure.
 Be Careful What You Download.
 Choose Strong Passwords.
 Make Online Purchases from Secure Sites.

3. Define the following –


(a) Plagiarism.
Answer:
Plagiarism is a type of cheating that involves the use of another person's ideas, words,
design, art, music, etc., as one's own in whole or in part without acknowledging the
author or obtaining his or her permission.

(b) Cyberbullying.
Answer:
Cyberbullying is bullying that takes place over digital devices like cell phones,
computers, and tablets. Cyberbullying can occur through SMS, Text, and apps, or online
in social media, forums, or gaming where people can view, participate in, or share
content.

CLASS-VIII-COMPUTER Page 1
Class-VIII-Chapter 10 - Computer Ethics
(c) Phishing.
Answer:
Phishing is a type of social engineering attack often used to steal user data, including
login credentials and credit card numbers. It occurs when an attacker, masquerading as
a trusted entity, dupes a victim into opening an email, instant message, or text message.

(d) Spamming.
Answer:
Spamming is when one person or company sends an unwanted email to another
person. Spam emails are the computer version of unwanted "junk mail" that arrives in a
mailbox, such as advertising pamphlets and brochures.

4. Explain the categories of Intellectual Property Rights.


Answer:
Intellectual property rights are legal rights that provide creators protection for original
works, inventions, or the appearance of products, artistic works, scientific
developments, and so on. There are four types of intellectual property rights (IP):
patents, trademarks, copyrights, and trade secrets.

5. Write a note on cybercrime.


Answer:
Cybercrime, also called computer crime, the use of a computer as an instrument to
further illegal ends, such as committing fraud, trafficking in child pornography
and intellectual property, stealing identities, or violating privacy. Cybercrime, especially
through the Internet, has grown in importance as the computer has become central to
commerce, entertainment, and government.

CLASS-VIII-COMPUTER Page 2
Class-VIII-Chapter 10 - Computer Ethics

CLASS-VIII-COMPUTER Page 3

You might also like