0% found this document useful (0 votes)
28 views6 pages

Class 7 Ch-4 Question Answer

The document discusses ethics in computing, highlighting five ethical values such as respecting proprietary software and protecting personal information. It outlines the advantages and disadvantages of the Internet, including its role in research and the risks of cyberbullying and hacking. Additionally, it provides guidelines for avoiding software piracy, protecting minors online, and the importance of firewalls in network security.

Uploaded by

utkarshakshat3
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
28 views6 pages

Class 7 Ch-4 Question Answer

The document discusses ethics in computing, highlighting five ethical values such as respecting proprietary software and protecting personal information. It outlines the advantages and disadvantages of the Internet, including its role in research and the risks of cyberbullying and hacking. Additionally, it provides guidelines for avoiding software piracy, protecting minors online, and the importance of firewalls in network security.

Uploaded by

utkarshakshat3
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

CH:-4 Ethics and safety measures in computer

Page no:-68 Long question answer

Question 1

What do you understand by Ethics? Mention at least five


ethical values related to computers.

Answer

Ethics is a set of moral principles that govern the behaviour of a


group or individual. Computer ethics regulate the use of
computers.

Five ethical values related to computers are as follows:

1. While accessing Internet, always work in a healthy


environment so that the objective is fulfilled.
2. Do not copy or use proprietary software for which we have
not paid.
3. Do not try to steal the secret information of any other
computer.
4. we must protect our document by using password and note
it in a diary in case you forget it.
5. If we are working on Internet, we should not browse any
unwanted website which is not safe.

Question 2

What are the advantages of using Internet? Explain.

Answer

The advantages of using Internet are as follows:


1. Internet can be used for searching any information through
various search engines.
2. The messages can be sent and received through e-mail on
internet.
3. It plays a significant role in research and development work.
4. It also allows video conversation with the relatives or friends
through social media.
5. It promotes 24 X 7 online shopping.

Question 3

What is cyberbullying? Explain how some internet users carry


it out.

Answer

Cyberbullying is a form of bullying using digital technology such


as internet, emails, social networking sites, mobile phones,
personal computers, etc. Some of the common ways through
which cyber bullying takes place are:

1. Threatening messages by email, text or through comments


on a social networking page.
2. Trapping someone and then sharing personal information
widely with others.
3. Spreading embarrassing rumours, secrets or gossip about
another person through social networking sites, email or
texts.
4. Posting an embarrassing picture or video of someone to
others without their knowledge or permission.

Question 4

What do you understand by Intellectual Property Rights?


Explain.
Answer

Intellectual property means 'Ownership of Ideas' which is created


by using skills and mental ability of the person. Intellectual
property rights are the rights given to persons over the creations
of their minds. They usually give the creator an exclusive right
over the use of his/her creation for a certain period of time.
These rights can be exercised in the form of software patents,
software copyright or trademark.

Question 5

Enlist some parental assistance for minors while accessing


Internet.

Answer

Some parental assistance for minors while accessing Internet are


as follows:

1. By viewing age appropriate web sites.


2. By using strong password that cannot be cracked so easily.
3. By not sharing password with any person.
4. On frequent changing password.
5. Responding to known email messages or attachments only.
6. By protecting computer with antivirus software. The
antivirus must be latest such as 'Quick Heal' or 'Firewall' that
recognizes most of the viruses.

Question 6

What are the different ways to stop Spam?

Answer

The different ways to stop Spam are as follows:


1. Installing good antivirus software in our computer system
and update regularly.
2. Avoid reading unwanted email messages and delete them to
keep inbox empty

Question 7

What are the disadvantages of using the Internet? Explain.

Answer

The disadvantages of using the Internet are:

1. Internet is a place to offer so much to its users and hence


becomes the biggest factor in distracting one from his/her
task.
2. People actively using internet can face cases of internet
bullying and crimes.
3. Hacking of personal profile and account has become
another cause of concern.
4. Safety of personal data and information also worries the
users.
5. Attack of viruses is also a threat of using internet.

Question 8

How will you avoid Software Piracy? Explain.

Answer

Some guidelines to avoid software piracy are as follows:

1. Always buy a software from a reputed organization.


2. We should Make sure that our software comes with a license
agreement, original disk and authentic packaging with
copyright.
3. Avoid buying of multiple software titles from different
publishers on a single disk.
4. If the seller provides the direction to obtain a serial number,
it indicates that the software is not authentic.

Question 9

What are the different steps must be taken to avoid hacking?

Answer

The following measures must be taken to avoid hacking:

1. Don't share your personal information with unknown or


suspicious sources.
2. Don't create a password based on your personal
information like last name, telephone number, etc.
3. Don't share your password with anyone even although
he/she is your close friend.

Don't access and download material from illegitimate sites.

4. Don't try to open and download unknown software and


email attachments that may contain viruses.
5. Use strong antivirus software for your computer.

Question 10

Explain how firewall protects a computer system.

Answer

Firewall is defined as a network security device that allows or


rejects network access between an untrusted zone (such as the
internet) and a trusted zone (a private network). It is designed to
filter incoming traffic and to protect unauthorised access from an
unknown network.

You might also like