Page 58 - Viva ICSE Computer Studies 7 : E-book
P. 58

4.  Hacking done for a good cause                                          _________________
                         5.  Illegal copying of software                                            _________________

                    D.  Match the columns.
                             Column A                   Column B                                 Column C
                         1.  Trademark             (a)  Twenty years time period             (i)  To acknowledge the
                                                                                                 original writer
                         2.  Copyright             (b)  Protects the information from        (ii)  Protects the rights of
                                                        getting copied, pirated                  creative people
                         3.  Patents               (c)  Prevented by citation               (iii)  Used by companies

                         4.  Intellectual          (d)  Ten years validity                  (iv)  Enforced by a court
                             property rights

                         5.  Plagiarism            (e)  More than seventy years validity     (v)  Granted to an inventor

                    E.  Answer the following questions.
                         1.  Enlist the benefi ts of e-mail.
                         2.  Describe the unethical practises on the Internet.
                         3.  Write a note on intellectual property right and the measures to protect them.
                         4.  Enlist the guidelines to prevent the following.
                            (a)  Software privacy              (b) Hacking                   (c) Spamming
                            (d)  Phishing                      (e) Plagiarism                (f) Cyberbullying
                         5.  Explain digital footprint and its types.

                     Building Values and Life Skills


                       1.  What will you do if your friend gives you a CD of a pirated software? Give reasons for your
                          answer.
                       2.  We should not monitor and collect others’ data without their consent. Do you agree with the
                          statement? Give reason for your answer.


                     Testing Knowledge


                     Why is it necessary to follow the rules that ensure Internet safety?


                     Linking Knowledge


                     English: Write an essay on ‘Advantages and Disadvantages of Internet’.




                                 Lab Fun

                     Find out about the cyber laws for hacking, phishing and cyberbullying. How strictly are they enforced?
                     Create a PowerPoint presentation on the collected data and format your presentation.




                     46
   53   54   55   56   57   58   59   60   61   62   63