Ethics and Safety Measures in Computing


Available Answers

  1. 1.

    Fill in the blanks.

    1. ___________ a set of procedures, moral principles, and ethical practices that regulates the use of computer.
    2. The simplest way to prevent plagiarism is the ___________.
    3. ___________ is an act of harming, harassing, or targeting a person by another person using Internet, in a deliberate manner.
    4. An illegal intrusion into a computer system or network is known as __________.
    5. __________ is a term referring to the legal property rights of a person over his/her creations of mind, both artistic and commercial.
  2. 2.

    State True or False:

    1. ​​​Spam are unwanted bulk emails that come from strange sources. 
    2. Hacking is the usage or imitation of the language and thoughts of another person and projected them as one's own original work. 
    3. You can identify the unsecured websites by looking at the green lock sign or https on the address bar. 
    4. A digital footprint is also known as digital dossier. 
    5. A patent grants the inventor the sole right to make, use, and sell that invention for an unlimited period. 
  3. 3.

    Neha is confused in deciding whether the mail which she has received is a genuine one or a spam. Can you help her in identifying the spam by specifying any indicative feature?

  4. 4.

    Ruby is surfing internet to prepare herself for the Civil Service Examination. She wants to know whether the websites which she is referring are secured or not. Suggest her the way with which she can clear her doubt. 

  5. 5.

    What are the advantages of Internet?

  6. 6.

    Write down any four ethical guidelines which should be followed while using a computer.

8 more answer(s) available.

Please login to post your comments.