0% found this document useful (0 votes)
184 views5 pages

Answer Key Computer Class 7 Ethics and Safety Measures in Computing

The document provides an answer key for a class on Ethics and Safety Measures in Computing, covering topics such as software piracy, digital footprints, cybercrime, and internet safety measures. It includes multiple-choice questions, true or false statements, fill-in-the-blanks, and matching exercises related to computer ethics. Additionally, it outlines steps to prevent software piracy and suggests safety measures for internet use.

Uploaded by

SUBHANKAR GHOSH
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
184 views5 pages

Answer Key Computer Class 7 Ethics and Safety Measures in Computing

The document provides an answer key for a class on Ethics and Safety Measures in Computing, covering topics such as software piracy, digital footprints, cybercrime, and internet safety measures. It includes multiple-choice questions, true or false statements, fill-in-the-blanks, and matching exercises related to computer ethics. Additionally, it outlines steps to prevent software piracy and suggests safety measures for internet use.

Uploaded by

SUBHANKAR GHOSH
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

Welland Gouldsmith Schools

Class: VII
Subject: Computers
Chapter: Ethics and Safety Measures in
Computing
Answer Key

1. Choose the correct option:

a. Google
b. Buy your own licensed copy of software.
c. All of these.
d. Steal a brand new computer
e. All of these.

2. State whether the following statements are TRUE or FALSE. Rewrite


the FALSE statements correctly.

a. FALSE. We should acknowledge the source of information.


b. TRUE
c. TRUE
d. FALSE. It means to rent out or lend software without the permission of the
license holder.
e. TRUE

3. Which of the following are wrong actions:

a. Right action
b. Wrong action
c. Wrong action
d. Wrong action
e. Right action
f. Wrong action
g. Wrong action
h. Wrong action
i. Right action
j. Wrong action
4. Fill in the blanks:

a. Software piracy
b. Digital footprints
c. Dr Ramon C. Barquin
d. Computer ethics
e. Internet ethics
f. Copyright
g. The United State of America in 1909
h. Advertising purposes
i. Rephrasing
j. Social consequences

5. Give one word for the following:

a. Firewall
b. Spamming
c. Plagiarism
d. Hacking
e. Identify theft

6. Match the columns:

A B
© Symbol for copyright material
Counterfeiting Creating copies of original software
Phishing Luring a user to a fake website
Loading unauthorised copies of software onto
Hard-disk loading the hard disk of a computer at the time of its
purchase
Users enter genuine website but is redirected
Pharming
to wrong website
Harassing, threatening someone on the
Cyber bullying
Internet
7. Answer the following questions:

a. The following steps can be taken to stop software piracy:


i. Purchasing software from reputed sellers.
ii. Purchase software from manufacturer’s website.
iii. Register your software and report piracy.

b. Digital footprints are the information about a particular person that exists on
the Internet as a result of her/his online activity. You leave digital footprints
while doing some activities online such as:
i. Accessing social networking website: when you accces any social
networking website, you post comments, share information and upload an
image or video. All these activities leave your record on the web page.
ii. Online shopping: while shopping on any website you have to enter
personal information such as your name, address, phone number and so
on.
iii. Blogging: publishing a blog and posting comments on other blogs are
other popular activities that add to your digital information.

c. Softlifting is the most common software piracy usually practised in home


and offices. Softlifting means sharing software with someone who is not
authorised by the license agreement. A common form of softlifting involves
purchasing a single incensed copy of software and then installing it on
several computers.

d. Some examples of cybercrime include:

i. Plagiarism: people have access to a vast amount of information on the


Internet. Some of them use another person’s ideas or work and pretend that
it is their own. This act is called plagiarism.
ii. Cyber bullying: Harassing, threatening or embarrassing anyone on the
Internet is known as cyber bullying. The people who perform cyber
bullying are called cyber bullies.
iii. Identity theft: in this, people use the Internet to steal someone else’s
personal information. The information they steal could include the date of
birth, phone number, credit card number, PIN of debit or credit card,
Aadhar card number and passwords. This stolen information is then used
for personal gain, such as obtaining new mobile connections, for online
shopping and for accessing bank accounts.
iv. Phishing and pharming: In a phishing attack, phishers lure a user via
email to a fake website. They create a website that looks similar to the
website of a genuine company such as a bank. In a pharming attack, when
a user enters a genuine web address, pharmers redirect her/him to a wrong
website.
v. Hacking: it is the act of gaining access to someone else’s computer for
viewing, copying or creating data on it. This is done with the help of
computer programs. A person who carries such activities is called a hacker.
vi. Spamming: Spam is unsolicited, unwanted email sent to many people. It
may contain advertisements or spread malware such as virus or may divert
you to a website to steal personal information. Most people using
spamming for advertisement purposes. You can stop spam by not sharing
your email id on the website where it is visible to the general public, use
different account for personal and public use, do not respond to and buy
from spam advertised websites.
vii. Software piracy: Software piracy is the illegal copying, distribution or use
of software applications. There are different forms of software piracy such
as softlifting, hard-disk loading, renting, counterfeiting and online piracy.
e. Suggest four safety measures while using the internet.

Safety measures while using the Internet include:


i. Personal information: Protect your personal information. Do not respond
to an email that asked for your personal information. You must never share
your name, home address, school name or mobile number with an
unknown person while using the Internet.
ii. Antivirus: Install and update your antivirus software regularly. Scan your
computer on a regular basis.
iii. Passwords: Passwords should never be shared with anyone except for your
parents. Always make sure you have logged out of your computer when
using the internet in a cyber café or library. If possible keep changing your
passwords every month. Your passwords must be a combination of letters,
numbers and special characters. these types of passwords are hard to crack
and keep your information safe.
iv. Online Advertisements: Do not busy anything online without consulting
your parents. Some advertisements may try to trick you by offering free
things or telling you have won something. This is their way of collecting
your personal information.
v. Using Firewall: Firewall is a security system for a network of computers
that can be implemented through hardware or software of a combination of
both. It works like a filter between your computer and the Internet. It
controls the access to selected websites and adjusts the web browser to
open only the selected websites. It provides a layer of security which
prevents attackers from accessing your information.
vi. Social Networking: Social Networking websites have a minimum age
requirement to sign up. These requirements are there to protect you. Once
you sign up in any social networking website, be careful about sharing
your personal information.

You might also like