Professional Documents
Culture Documents
Ethics and Safety Measures in Computing
Ethics and Safety Measures in Computing
Ethics and Safety Measures in Computing
1. Virus is a malicious code that attaches itself with program files and
corrupts them.
2. Private network use firewall to keep unwanted IP address filtered out.
3. Spyware installs itself on the computer without user’s knowledge and
monitors activities on that computer.
4. Fraudulently acquiring sensitive information from the users is called
Phishing.
5. A website’s SSL certificate icon is denoted by a closed. Padlock.
C. Tick (√) the correct statement and cross (×) out the wrong one.
3. List any five steps children must take if they are threatened by a
cyber-bully.
Ans: i. Children must know that their parents and teachers are always
available for them when they face such problem.
ii. Children must know that no matters what, parents and teachers
are their first support.
iii. Children should inform their elders about any incident that
sounds nasty even remotely.
iv. Children must know the fact that cyber bullies are not capable to
do any harm and they can never carry out their claims of harming
someone.
v. Children are advised to block such intruders immediately and
never entertain them.