Page 57 - Viva ICSE Computer Studies 7 : E-book
P. 57
Quick Recall
• The Internet is also called global network of computers.
• Plagiarism refers to the use of another persons’ ideas or a part of their copyright work and
pretend that it is your own.
• Cyberbullying is the use of digital communication tools (such as the Internet) to make other
person feel angry, sad or scared, usually again and again.
• Phishing is a cybercrime where an e-mail is sent to a person misguiding him/her to believe that
it is from a trusted organisation.
• Spams are unwanted mails that are received in bulk from unknown sources.
• The copyright law protects the rights of creative people such as artists, musicians, programmers,
writers and authors to stop unauthorised or illegal reproduction of their work by others.
• Digital footprint is the information/impression about an person on the Internet due to his/her
online activity.
A. Fill in the blanks.
1. The Internet is also called ___________________ of computers.
2. A _________________ helps to access the desired information from the Internet.
3. E-commerce refers to buying and selling of various products _______________.
4. E-banking allows customers to conduct _______________ transactions on a secure website.
5. Most of the service providers off er _______________ accounts free of cost.
B. State whether the following statements are true or false.
1. www.google.com does not off er e-mail service. __________
2. You need to register, choose an e-mail ID and create a password to
access an e-mail service. __________
3. E-commerce is available only during the day. __________
4. The Internet and games played on it can become very addictive. __________
5. Ethics are required to maintain the system security. __________
C. Name the following.
1. Use of other persons’ copyright work and pretend that it is your own _________________
2. Cybercrime where an e-mail is sent to a person misguiding him to
believe that it is from the trusted organisation _________________
3. Getting into someone else’s computer system without illegally _________________
45