0 ratings0% found this document useful (0 votes) 14K views8 pagesCyber Beans Class 7 Exercise
cyber beans class 7 exercise
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here.
Available Formats
Download as PDF or read online on Scribd
eo. «, and ethical practices that regulates the
1. Garris. Aas area set of pr
use of computer.
cedures, moral principle
2. The simplest way to prevent plagiarism is Coroner
2 it ing, or ti
. Gaps Wud ping is an act of deliberately harming, harassing.
using the Internet. ;
Adon er
4, Anillegal intrusion int Isknownes OOS %
ke legal intrusion into a computer system or network is known as wv
argeting a person by another person
‘on over creations of his/her
é: a term referring to the legal property rights of a Pers
mind, both, artistic and commercial.
B. State True or False:
» Cyber bullying
Intellectual property» Computer Ethics» Hacking » Citation ¥ lying
1. Spamsare unwanted bulk e-mails that come from strange sources.
2. Hackingjis the usage or imitation of the language and thoughts of another person and projecting
themasone's ownoriginal work.
3. Youcanidentify the unsecured websites by looking at the lock sign or https on the address bar.
4. _ Encryptionis the process of transforming data into an unreadable code.
AA a
5. Apatent grants the inventor the sole right to make, use, and sell that invention for an unlimited
period.
Application Based Questions:
1. _Nehaisconfused in deciding whether the mail which she has received is a genuine one or a spam. Can youhelp
herinidentifying the spam by specifying any indicative feature?( How to identify spam? Cc-xr
Regen
forms of spam.
© Messages that donot include your e-mail address in the TO: or CC:fields are commor
© Somespame-mailcancontai offensive language orlinksto websites with inappropriate content. )
mane spam ememcan comer SIE aaB, State True or False:
1. Spamsare unwanted bulk e-mails that come from strange sources.
2. _Hackingis the usage or imitation of the language and thoughts of another person and projecting
themas one's own original work.
ene
3. Youcanidentify the unsecured websites by lookingat the lock sign or https on the address bar.
Ag 2
A
| L
4, _ Encryptionis the process of transforming data into an unreadable code.
5. Apatent grants the inventor the sole right to make, use, and sell that invention for an unlimited .&
_ whatare the advantages of the intemet?
sm. What steps can be taken to prevent it?
CT. irey Rights from getting violated?
Howcan|
you protect your Intellectual Prope!a a
) 22 not use computer technology to . 3
steal informati pias
“Upterference in other users' wo rMation or to cause.discuption or
’ Donotspy on another person's computer data. Bae
contribute eae
' _Donotcontributetothe spread of wrong information using computer technology.
1 Beoldbuyg pirated software. Pay for the software unlessitisfree )
gp ponotuse someone else's computerresources without an authorization.
i Donot claim ownership ona work whichis the output of someone else's intellect.
4 Before developing a software, think about the social impactit can have.
! Be respectful and courteous with the fellow users while communicating on
;
theInternet.
‘PUNETHICAL PRACTICES
“sthefollowing section, we will discuss some of the common unethical practices whichMeasures to Prevent Plagiarism esr 7
The simplest way to prevent plagiarism s ‘citation’. The process of acknowledging the original writer and the sour
from where the material has been taken is called ‘citation’ jt includes the following steps:
All sources are neither accurate, nor they validate the information as accurate. Therefore, you must specify the
Source, which informs readers regarding the basis of your ideas and the extent of your research. Citation gives
strength to yourresource.
Toavoid plagiarism, one can rephrase the matter.
Use quotation marks aroundall the quoted words of another person to avoid plagiarism.
Inthe education sector, students should be encouraged to present their original and innovative ideas, Eveni
they wish to refer to the resources, they should be made aware of the pattern of references. In this mannerty a
Measures to Protect Intellectual Property Rights «that grants the inventor the
© Patent your Inventions: A patent isa right relating tothenew eS rail period fora patentin Tess
_ right to make, use, and sell that invention fora specific peciad.atsin®
20 years from the date of filing of the patent application.
lawtothe creator forhis origin
ntgranted by
galright g! y of the work) translation of tne
hers to create a COP:
be taken ifsomeone copies the Work withoy,
andliterary creations, such as novels, pay,
ight of work lasts for more than sevens,
© Copyright your Artand Publications: A copyrights le
‘work. The rights provided under copyright law prohibit ot
work, and distribution of the work to the public. Legalactioncan
the permission of the author or the organisation. It covers artistic.
poems, musical compositions, and architectural designs. The copyri
years, even after the death of its author.
packaging, and other distinctive design,
@ _ Register your Trademarks: This protects the brand names, logos, sign
f : .fromthat of others. The validity periag
that identify and distinguish the products of one manufacturer or selle!
foratrademarkis ten years and it can be further renewed.
ios oe