50% found this document useful (2 votes)
5K views2 pages

Class 8 Cyber Ethics Worksheet

The document is a worksheet on cyber ethics for Class VIII students. It contains questions about ethical and unethical behavior related to computers and the internet. The questions cover topics such as software piracy, spreading viruses, intellectual property rights, phishing, hacking, and cybercrimes like cyberbullying and ransomware. The worksheet aims to teach students about responsible and legal online behavior.

Uploaded by

Adwitya
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
50% found this document useful (2 votes)
5K views2 pages

Class 8 Cyber Ethics Worksheet

The document is a worksheet on cyber ethics for Class VIII students. It contains questions about ethical and unethical behavior related to computers and the internet. The questions cover topics such as software piracy, spreading viruses, intellectual property rights, phishing, hacking, and cybercrimes like cyberbullying and ransomware. The worksheet aims to teach students about responsible and legal online behavior.

Uploaded by

Adwitya
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

ST JOHN’S SCHOOL

GREATER NOIDA WEST


CLASS VIII
CYBER ETHICS
WORKSHEET

A. Write T for True or F for False.

1. There is no need to consider the social consequences of the work you are doing on a
computer.

2. It is improper to use pirated software.

3. The files in any computer are public property.

4. Spreading viruses or any harmful programs in computers is unethical.

B. Match the columns.

1 Rights given to persons over their creations a Phishing

2 Luring a user to a fake website b Computer ethics

3 An activity of cracking passwords c Intellectual property rights

4 Rules and practices followed on a d hacking


computer
5 Redirecting a user to a fake website e pharming

C. Fill in the blanks:-

(1) ___________ is an act where the child is been tortured, threatened, harassed etc or

otherwise targeted by other child using the internet, interactive or digital technologies or

mobile phones.

(2) The crime which involves any computer/network/internet or any electronic media is

termed as _____________.

(3) ________ is the person who focuses on security mechanism of computer and

network systems and seeks access to the computer system despite these security
measures.

(4)___________ involves the criminal activities such as theft, fraud, forgery,

defamation, and mischief which are addressed by _________________.

(5)____________ is because of anger, revenge, or frustration.

(6) This cybercrime is used to steal important information to cause financial damage,

and to even block access to one’s email amount by sending emails to distribute malicious

attachments or links is ____________

(7) In ___________ cybercrime, only when the ransom is paid to the attacker, the victim

receives a decryption key.

(8) _____________ are the people who create malware to damage electronic files.

You might also like