CBSE SOLUTIONS-2026-27
CLASS-8
CHAPTER-1 INTERNET ETHICS
A. Use your pencil and fill the correct circles:
1. These are unwanted bulk e-mails from strange sources:
(A) Trash (B) Spams (C) Phishing (D) E-mail
Answer: (B) Spams
2. The trail or information you leave behind when you go online:
(A) Plagiarism (B) Copyright (C) Both A & B (D) Digital footprint
Answer: (D) Digital footprint
3. Illegal activities done using the internet or computer:
(A) Cybercrime (B) Digital footprint (C) Software piracy (D) Spamming
Answer: (A) Cybercrime
4. This involves sending massive amounts of spam emails by spammers until the mail server becomes overloaded and crashed:
(A) Hacking (B) Mail bombing (C) Phishing (D) All of these
Answer: (B) Mail bombing
B. Write TRUE or FALSE:
1. Check your online accounts and bank statements regularly to ensure that no unauthorized transactions are made.
Answer: TRUE
2. Hacking, which is done for a good cause, such as national security, is known as Ethical hacking.
Answer: TRUE
3. To avoid plagiarism, one can rephrase the material.
Answer: TRUE
4. Threat is the act of using or imitating someone’s language, thoughts or ideas and presenting as one’s own original work.
Answer: FALSE
5. Do not disclose your identity to unknown persons on the social media platform.
Answer: TRUE
C. Fill in the blanks with the words given below:
1. Hackers usually tamper with data for ________________ purposes.
Answer: unethical
2. _______________ is a trick where someone sends an e-mail to a user that looks like it is from a real person.
Answer: Phishing
3. In ________________, millions of copies of the same message are sent to e-mail users worldwide.
Answer: spamming
4. The use of internet can affect the ________________ rights and personal data of a person.
Answer: privacy
5. A ________________ is a legal right granted by law to the creator for his original work.
Answer: copyright
D. Answer these questions:
1. Describe the advantages of Internet.
Answer: The Internet has many advantages. It provides quick access to vast information, enables instant global communication, supports online shopping, banking and e-learning, offers entertainment, and allows easy sharing of knowledge and ideas.
2. Define cyber terrorism.
Answer: Cyber terrorism is the use of internet and computers by individuals or groups to attack critical infrastructure and systems to create fear, damage or harm for political, religious or ideological reasons.
3. What do you understand by computing ethics? List down any four ethical guidelines.
Answer: Computing ethics means the set of moral principles that guide the proper and responsible use of computers, internet and digital technologies.
Four ethical guidelines:
1. Respect the privacy of others and protect personal data.
2. Do not engage in hacking, virus spreading or any cybercrime.
3. Always give proper credit to original creators and avoid plagiarism.
4. Do not send spam mails or participate in cyberbullying.
4. What is phishing? Write any three steps to avoid it.
Answer: Phishing is a cyber attack in which fake emails or messages are sent that look genuine to trick users into revealing personal information like passwords, bank details or OTPs.
Three steps to avoid it:
1.Never click on suspicious links or download attachments from unknown senders.
2. Always verify the sender’s email address before providing any information.
3. Use strong unique passwords and enable two-factor authentication (2FA).
5. Write a short note on:
Answer:
(a) Hacking
Hacking is the unauthorized access to a computer system or network. It is usually done to steal data or cause damage. Ethical hacking is performed with permission to find and fix security weaknesses.
(b) Software piracy
Software piracy is the illegal copying, downloading or distribution of copyrighted software without paying for it. It is a crime that causes financial loss to software developers.
(c) Digital footprint
Digital footprint is the record of all the information and activities a person leaves behind while using the internet. It includes posts, searches, likes and visited websites. One should be careful because it can affect privacy and future opportunities.

No comments:
Post a Comment