KnowledgeBoat Logo
OPEN IN APP

Chapter 4

Ethics and Safety Measures in Computing

Class 7 - APC Understanding Computer Studies


State whether the following statements are True/False

Question 1

It is advised to view age appropriate web sites.
True

Question 2

The people who are involved in the cyber crime are called 'Hackers'.
True

Question 3

Always share your password among your friends.
False

Question 4

It is advised to comment on any social networking site.
False

Question 5

You can always open mail from unknown source.
False

Question 6

Don't try to download unknown software and e-mail attachments that may contain viruses.
True

Question 7

You can always use strong antivirus softwares in your computer system.
True

Question 8

Cyber bullying shows rude behaviour with the parents.
True

Question 9

Provide strong password to a system, so that it cannot be cracked so easily.
True

Question 10

Firewall is defined as a network security device that allows or rejects network access between the Internet and a private network.
True

Fill in the blanks

Question 1

Computer ethics is a set of moral values, which regulates the use of computers.

Question 2

The process of making duplicate copy of the original software illegally is known as software piracy.

Question 3

Unwanted e-mails are called spam.

Question 4

A program which may corrupt the files/documents in your computer is known as virus.

Question 5

Intellectual property means 'Ownership of Ideas', created by using skills and mental ability of the person.

Question 6

Cyber bullying means the aggressive behaviour shown through text messages, chatting or video communication.

Question 7

It is advised to have antivirus software to protect system from viruses.

Question 8

Phishing is a new kind of cybercrime and method of committing online financial fraud.

Question 9

Firewall defined as a network security device that allows or rejects network access between an untrusted zone and a trusted zone.

Question 10

Password can be used to protect any document on the Internet.

Write short notes on

Question 1

Software Piracy

Answer

When we purchase a software, we become a licensed user and have a right to use the software on a single computer. But we cannot put copies on other machines or pass the software among our colleagues.

Piracy refers to illegal distribution. The process of making copies of software without buying the appropriate license or copyright is known as software piracy.

Question 2

Spam

Answer

When we open our mailbox, we find a number of unwanted mails have come into our inbox from different parts of the world organizations. Sometimes, the titles of these messages are very fascinating and compel us to read the mails. These unwanted messages of mailbox are called spam.

Spam is an attempt to force the message on people who would not otherwise choose to receive it. Spams not only waste the time of the user but also occupy memory space of the system. Spams may also contain viruses.

Question 3

Phishing

Answer

In the cyber-world, phishing is a form of illegal act where fraudulently, sensitive information is acquired like passwords, debit or credit card details by a person posing as a trustworthy or a business communication.

Question 4

Hacking

Answer

Hacking can be defined as unauthorized use of computer and network resources. Unfortunately these skills are applied in illegal activities.

Hacking is a technique by which some computer experts can access the data from confidential areas of the system.

Question 5

Cyber bullying

Answer

The term bullying is unwanted or aggressive behaviour shown by a person. Cyber bullying is the agressive behaviour shown through text messages, chatting or video communication. The main source of cyber bullying can be seen on the social networking sites.

Question 6

Plagiarism

Answer

If we create or develop something on the Internet, then we are the absolute owner of our creation. It comes under intellectual property right. In case, someone uses our creation and produces as his own creation then it is the violation of copyright act.

An act of copying other's creation and producing as own creation in same form or other is known as plagiarism.

Question 7

Firewall

Answer

Firewall is defined as a network security device that allows or rejects network access between an untrusted zone and a trusted zone. It acts as a two way traffic system and protects the computer system as well.

Whenever a message is received, it is passed through Firewall for authentication. If it is from an authorised source then allowed entering your computer system otherwise, blocked.

Question 8

Digital Footprint

Answer

Internet is a very useful tool for getting information and sharing messages. Sometimes, it may happen that we leave information while accessing a site or passing messages through e-mail. We may also leave our account logged-in unknowingly. Leaving used site or mail ID online is said to be digital footprint.

Digital footprint is trailing information online about accessing a site or mail ID left unclosed or undeleted.

Long Answer Questions

Question 1

What do you understand by Ethics? Mention at least five ethical values related to computers.

Answer

Ethics is a set of moral principles that govern the behaviour of a group or individual. Computer ethics regulate the use of computers.

Five ethical values related to computers are as follows:

  1. While accessing Internet, always work in a healthy environment so that the objective is fulfilled.
  2. Do not copy or use proprietary software for which you have not paid.
  3. Do not try to steal the secret information of any other computer.
  4. You must protect your document by using password and note it in a diary in case you forget it.
  5. If you are working on Internet, you should not browse any unwanted website or open any type of mails of others by any means.

Question 2

What are the advantages of using Internet? Explain.

Answer

The advantages of using Internet are as follows:

  1. Internet can be used for searching any information through various search engines.
  2. The messages can be sent and received through e-mail on internet.
  3. It plays a significant role in research and development work.
  4. It also allows video conversation with the relatives or friends through Skype or Facebook.
  5. It promotes 24 X 7 online shopping.
  6. It keeps a track of share and stock marketing.
  7. Online banking can be used to purchase railway, flight or movie tickets.

Question 3

Explain the various effect of cyber bullying.

Answer

The various effects of cyber bullying are as follows:

  1. Behaving rudely with the parents.
  2. Bunking classes during school periods.
  3. It affects deterioration in academic performance.
  4. It promotes unnecessary quarrelling with friends and classmates.
  5. It also affects in health deterioration.
  6. It lessens one's self confidence.

Question 4

What do you understand by Intellectual Property Rights? Explain.

Answer

Intellectual property means 'Ownership of Ideas' which is created by using skills and mental ability of the person. The softwares originally developed by the persons become the intellectual property of the developers.

Intellectual property rights are the rights given to persons over the creations of their minds. They usually give the creator an exclusive right over the use of his/her creation for a certain period of time. These rights can be exercised in the form of software patents, software copyright or trademark.

Question 5

Enlist some parental assistance for minors while accessing Internet.

Answer

Some parental assistance for minors while accessing Internet are as follows:

  1. By viewing age appropriate web sites.
  2. By using strong password that cannot be cracked so easily.
  3. By not sharing password with any person.
  4. On frequent changing password.
  5. Responding to known email messages or attachments only.
  6. By protecting computer with antivirus software. The antivirus must be latest such as 'Quick Heal' or 'Firewall' that recognizes most of the viruses.

Question 6

What are the different ways to stop Spam?

Answer

The different ways to stop Spam are as follows:

  1. Installing good antivirus software in our computer system.
  2. Avoid reading unwanted email messages and delete them to keep inbox empty

Question 7

What precaution will you take while using Internet? Explain.

Answer

Precautions that we should take while using Internet are as follows:

  1. Don't share your personal information like name, age, address, account number etc.
  2. Don't create a password based on your personal information like last name, telephone number etc.
  3. Don't share your password with anyone although he is your close friend.
  4. Don't access irrelevant sites, open mails from unknown sources and comment anyone on social networking site.
  5. Don't try to download unknown software and e-mail attachments that may contain viruses.
  6. Use strong antivirus softwares for your computer.
  7. Don't get tempted towards unknown advertisement. You may be trapped for harassment.
  8. Don't send any kind of message bullying your friend or any unknown person over social networking sites like Facebook, Twitter or Whatsapp.

Question 8

How will you avoid Software Piracy? Explain.

Answer

Some guidelines to avoid software piracy are as follows:

  1. Always buy your software from a reputed organization.
  2. Make sure that your software comes with a licence agreement, original disk and authentic packaging with copyright.
  3. Avoid buying of multiple software titles from different publishers on a single disk.
  4. If the seller provides the direction to obtain a serial number, it indicates that the software is not authentic.
PrevNext