Informatics Practices
Neetu has recently shifted to a new city and a new school. She does not know many people there. However, someone starts posting negative, demeaning comments on her social networking profile, school site's forum, etc.
She also starts getting repeated mails from unknown people. Every time she goes online, she finds someone chasing her online.
(i) What is all this happening to Neetu?
- Neetu has become a victim of cyber bullying and cyber stalking
- Eaves dropping
- Scam
- Violation of IPR
(ii) What action should be taken by her to stop all this?
- Discuss with her parents
- Discuss in peer group
- Keep quiet and suffer emotionally
- She must immediately bring all this to the notice of her parents and school authorities and also report this to the cybercrime wing of the local police with the help of her parents.
(iii) The act of fraudulently acquiring someone's personal and private information, such as online account names, login information and passwords is called …………… .
- Phishing
- Identity theft
- Fraud
- Plagiarism
(iv) Neetu needs to protect her personal information or data from unintentional and intentional attacks and disclosure which is termed as …………… .
- Digital right
- Privacy
- Copyright
- Intellectual property
(v) A set of moral principles that governs the behaviour of a group or individual and regulates the use of computers.
- Copyright
- Computer ethics
- Property rights
- Privacy law
Computing Safety & Ethics
2 Likes
Answer
(i) Neetu has become a victim of cyber bullying and cyber stalking
Reason — Neetu is being targeted online with negative comments, repeated emails, and online harassment, which are all forms of cyberbullying and cyberstalking.
(ii) She must immediately bring all this to the notice of her parents and school authorities and also report this to the cybercrime wing of the local police with the help of her parents.
Reason — Neetu should inform her parents and school authorities about the online harassment and report it to the cybercrime wing of the local police to take legal action against the perpetrators.
(iii) Phishing
Reason — Phishing is an unlawful activity where fake websites or emails that look original or authentic are presented to the user to fraudulently collect sensitive and personal details, particularly usernames, passwords, banking and credit card details.
(iv) Privacy
Reason — Neetu needs to protect her personal information and data from unauthorized access, disclosure, or misuse, which is referred to as privacy. Privacy is the right to control one's personal information and data.
(v) Computer ethics
Reason — A set of moral principles that governs the behaviour of a group or individual and regulates the use of computers is called computer ethics.
Answered By
2 Likes
Related Questions
Munish has topped in all the subjects in his school exams. His father has gifted him a laptop. He would like to make Munish aware of the health hazards associated with inappropriate and excessive use of laptop. Help his father list the points which he should discuss with Munish.
Jayati Chatterjee is studying digital footprints. Help her clarify the concepts of digital footprints.
(i) Digital footprints are also known as:
- Digital data
- Digital tattoos
- Plagiarism
- Digital print
(ii) Digital footprints are stored
- Temporarily (for a few days)
- For 7 days only
- Permanently
- For 3 days only
(iii) Whenever we surf the internet using smartphones, we leave behind a trail of data reflecting the activities performed by us online, which is termed as …………… .
- Digital footprint
- Online handprint
- Digital activities
- Internet activities
(iv) There are …………… kinds of digital footprints.
- 1
- 3
- 2
- 4
(v) Which is the correct type(s) of digital footprint?
- Active digital footprint
- Passive digital footprint
- Both (1) and (2)
- None of these
What do you mean by Cybercrime?
What is meant by cyber ethics? How are they Important for us?