Page 57 - Viva ICSE Computer Studies 7 : E-book
P. 57

Quick Recall


                      •  The Internet is also called global network of computers.
                      •  Plagiarism refers to the use of another persons’ ideas or a part of their copyright work and
                        pretend that it is your own.
                      •  Cyberbullying is the use of digital communication tools (such as the Internet) to make other
                        person feel angry, sad or scared, usually again and again.
                      •  Phishing is a cybercrime where an e-mail is sent to a person misguiding him/her to believe that
                        it is from a trusted organisation.
                      •  Spams are unwanted mails that are received in bulk from unknown sources.

                      •  The copyright law protects the rights of creative people such as artists, musicians, programmers,
                        writers and authors to stop unauthorised or illegal reproduction of their work by others.
                      •  Digital footprint is the information/impression about an person on the Internet due to his/her
                        online activity.










                    A.  Fill in the blanks.
                         1.  The Internet is also called ___________________ of computers.

                         2. A _________________ helps to access the desired information from the Internet.
                         3.  E-commerce refers to buying and selling of various products _______________.
                         4.  E-banking allows customers to conduct _______________ transactions on a secure website.

                         5.  Most of the service providers off er _______________ accounts free of cost.

                    B.  State whether the following statements are true or false.
                         1.  www.google.com does not off er e-mail service.                                 __________

                         2.  You need to register, choose an e-mail ID and create a password to
                             access an e-mail service.                                                      __________
                         3.  E-commerce is available only during the day.                                   __________
                         4.  The Internet and games played on it can become very addictive.                 __________
                         5.  Ethics are required to maintain the system security.                           __________


                    C.  Name the following.
                         1.  Use of other persons’ copyright work and pretend that it is your own   _________________
                         2.  Cybercrime where an e-mail is sent to a person misguiding him to
                             believe that it is from the trusted organisation                       _________________
                         3.  Getting into someone else’s computer system without illegally          _________________





                                                                                                                    45
   52   53   54   55   56   57   58   59   60   61   62