0% found this document useful (0 votes)
14K views8 pages

Cyber Beans Class 7 Exercise

cyber beans class 7 exercise

Uploaded by

ItzMehran
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
14K views8 pages

Cyber Beans Class 7 Exercise

cyber beans class 7 exercise

Uploaded by

ItzMehran
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 8
eo. «, and ethical practices that regulates the 1. Garris. Aas area set of pr use of computer. cedures, moral principle 2. The simplest way to prevent plagiarism is Coroner 2 it ing, or ti . Gaps Wud ping is an act of deliberately harming, harassing. using the Internet. ; Adon er 4, Anillegal intrusion int Isknownes OOS % ke legal intrusion into a computer system or network is known as wv argeting a person by another person ‘on over creations of his/her é: a term referring to the legal property rights of a Pers mind, both, artistic and commercial. B. State True or False: » Cyber bullying Intellectual property» Computer Ethics» Hacking » Citation ¥ lying 1. Spamsare unwanted bulk e-mails that come from strange sources. 2. Hackingjis the usage or imitation of the language and thoughts of another person and projecting themasone's ownoriginal work. 3. Youcanidentify the unsecured websites by looking at the lock sign or https on the address bar. 4. _ Encryptionis the process of transforming data into an unreadable code. AA a 5. Apatent grants the inventor the sole right to make, use, and sell that invention for an unlimited period. Application Based Questions: 1. _Nehaisconfused in deciding whether the mail which she has received is a genuine one or a spam. Can youhelp herinidentifying the spam by specifying any indicative feature? ( How to identify spam? Cc-xr Regen forms of spam. © Messages that donot include your e-mail address in the TO: or CC:fields are commor © Somespame-mailcancontai offensive language orlinksto websites with inappropriate content. ) mane spam ememcan comer SIE aa B, State True or False: 1. Spamsare unwanted bulk e-mails that come from strange sources. 2. _Hackingis the usage or imitation of the language and thoughts of another person and projecting themas one's own original work. ene 3. Youcanidentify the unsecured websites by lookingat the lock sign or https on the address bar. Ag 2 A | L 4, _ Encryptionis the process of transforming data into an unreadable code. 5. Apatent grants the inventor the sole right to make, use, and sell that invention for an unlimited . & _ whatare the advantages of the intemet? sm. What steps can be taken to prevent it? CT. i rey Rights from getting violated? Howcan| you protect your Intellectual Prope! a a ) 22 not use computer technology to . 3 steal informati pias “Upterference in other users' wo rMation or to cause.discuption or ’ Donotspy on another person's computer data. Bae contribute eae ' _Donotcontributetothe spread of wrong information using computer technology. 1 Beoldbuyg pirated software. Pay for the software unlessitisfree ) gp ponotuse someone else's computerresources without an authorization. i Donot claim ownership ona work whichis the output of someone else's intellect. 4 Before developing a software, think about the social impactit can have. ! Be respectful and courteous with the fellow users while communicating on ; theInternet. ‘PUNETHICAL PRACTICES “sthefollowing section, we will discuss some of the common unethical practices which Measures to Prevent Plagiarism esr 7 The simplest way to prevent plagiarism s ‘citation’. The process of acknowledging the original writer and the sour from where the material has been taken is called ‘citation’ jt includes the following steps: All sources are neither accurate, nor they validate the information as accurate. Therefore, you must specify the Source, which informs readers regarding the basis of your ideas and the extent of your research. Citation gives strength to yourresource. Toavoid plagiarism, one can rephrase the matter. Use quotation marks aroundall the quoted words of another person to avoid plagiarism. Inthe education sector, students should be encouraged to present their original and innovative ideas, Eveni they wish to refer to the resources, they should be made aware of the pattern of references. In this manner ty a Measures to Protect Intellectual Property Rights «that grants the inventor the © Patent your Inventions: A patent isa right relating tothenew eS rail period fora patentin Tess _ right to make, use, and sell that invention fora specific peciad.atsin® 20 years from the date of filing of the patent application. lawtothe creator forhis origin ntgranted by galright g! y of the work) translation of tne hers to create a COP: be taken ifsomeone copies the Work withoy, andliterary creations, such as novels, pay, ight of work lasts for more than sevens, © Copyright your Artand Publications: A copyrights le ‘work. The rights provided under copyright law prohibit ot work, and distribution of the work to the public. Legalactioncan the permission of the author or the organisation. It covers artistic. poems, musical compositions, and architectural designs. The copyri years, even after the death of its author. packaging, and other distinctive design, @ _ Register your Trademarks: This protects the brand names, logos, sign f : .fromthat of others. The validity periag that identify and distinguish the products of one manufacturer or selle! foratrademarkis ten years and it can be further renewed. ios oe

You might also like