You are on page 1of 7

Grade 7

Chapter 2. Digital Literacy: Staying Safe Online


(Question-Answer)

 2.1-Test (Page no. 37)


1. Name two reasons for data being collected online.
Ans. Two reasons for data being collected online as: website
registration, online shopping order, bank transaction, fault report.

2. What are the two main reasons that websites use cookies?
Ans. The two main reasons why websites use cookies are:
1) To makewebsites easier to use
2) To personalize web services

3. Explain how cookies can be used to personalize a website. Give


examples.
Ans. Examples of how cookies can be used to personalize a
website:
 Cookies can use location data to provide information on local
events( such as the local whether report)
 Cookies can capture a user’s past activity and use this
information to predict what the user will be interested in today
(such as customized news feeds and targeted advertising).

4. Why do people worry about the use of cookies on websites?


Ans. Some of the main reasons why people worry about cookies
are:
 Data may be captured and used for reasons that the user has
not agreed to.
 Data could be sold on to another organization without the
user knowing.
 Saved information may be used to try to influence people’s
opinions, for example, how to vote in an election.

Grade 7_Chapter 2 (Term2) Page 1 of 7


 2.2-Test (Page no. 41)

1. Name three types of malware.


Ans. Types of malware are:
 Virus
 Trojan
 Ransom ware
 Spyware
 Adware

2. What is ransom ware and why is it dangerous?


Ans. Ransom ware encrypts data on a computer, making files unusable. A
ransom is requested in exchange for a decryption key. Ransom ware is
dangerous because data becomes unusable, which prevents individuals and
organizations from working. This can be particularly serious in organizations
such as hospitals.

3. Explain why a stolen identity can be valuable to a criminal?


Ans. Criminals can use a stolen identity to steal money and goods directly.
They can also set up fake bank accounts and fake online documents that they
can use to commit fraud.

4. Describe how criminals use emails to spread malware.


Ans. Some criminals spread malware by attaching a file that contains the
malware on an email that they send to many recipients. The email uses
persuasive language that encourages the recipient to open the attachment. If
the recipient does open the attachment, the malware will infect their
computer.

Grade 7_Chapter 2 (Term2) Page 2 of 7


 2.3-Test (Page no. 45)
1. Name two types of software you can use to protect your computer from
malware.
Ans. The two types of software used to protect computers from malware are
anti-virus (AV) software and firewall.

2. Why is it important to update the software on your computer regularly?


Ans. It is important to update the software on your computer regularly
because updates often fix security issues to prevent malware attacks.

3. Explain how AV software and a firewall work together.


Ans. A firewall prevents unauthorized access to a computer, particularly over
the internet. It prevents hacking attacks and blocks download from untrusted
sites. AV software identifies any malware that has slipped through the
firewall (for example, malware that is sent in an email attachment).

4. Explain why you need to be careful when you open a file attached to an
email.
Ans. You need to be careful when you open a file attached to an email
because the attached file could contain malware. The malware will usually be
harmless until the file is opened. Once opened, the malware is activated and
could damage files or attack the computer system in other ways (for example,
spyware records the user’s input to the computer).

Grade 7_Chapter 2 (Term2) Page 3 of 7


 2.4-Test (Page no. 49)

1. List the actions you should take if you are bullied online.
Ans. The actions you should take if you are bullied online include:
 Report the problem to an adult.
 Do not respond to the bully.
 Collect evidence.
 Spend some time offline.

2. Explain two methods that a cyber-bully uses.


Ans. Methods that cyber-bully uses include:
 Harassment
 Impersonation
 Exclusion
 Dissing
 Photographs

3. Explain why someone might decide to bully another person online.


Ans. Someone might decide to bully another person online because of
jealousy, seeking revenge, feeling unhappy or insecure, seeking approval,
feeling threatened, believing they can stay anonymous.

4. What should you do if you receive a threatening message on your phone


or computer?
Ans. If you receive a threatening message on your phone or computer yoi
should:
 Block the number or account sending the message
 Not respond to the message
 Report the message to trusted adult.

Grade 7_Chapter 2 (Term2) Page 4 of 7


 2.5-Test (Page no. 53)

1. Name two types of intellectual property.


Ans. Intellectual properties includes: books, photos, artwork, computer
programs, games, designs.

2. What information should you use in a credit when you use someone
else’s work?
Ans. The information you should use in a credit for using someone else’s
work is: the owner’s name, the title of the work, the source and the date.

3. Explain why intellectual property theft and software piracy are bad for
the owners of content.
Ans. Intellectual property theft and software piracy are bad for the owners of
content because the owner of content loses money and does not get the credit
they are due for their work.

4. Explain why it is good idea to use a creative commons site when you are
searching for images to use in your work.
Ans. It is a good idea to use a creative commons site because Creative
Commons images have a license that allows you to use the images without
having to seek permission. The license often provides a credit that you can
use in your document, so you don’t have to write one yourself.

Grade 7_Chapter 2 (Term2) Page 5 of 7


 2.6-Test (Page no. 57)

1. Why is it a good idea to search for images on a Creative Commons


website?
Ans. It is a good idea to search for images on a Creative Commons website
because these websites make images available to be shared with others. The
images are usually free to use. The Creative Commons license clearly states
how the material can be used.

2. What must you do if you want to use another person’s content in an


assignment?
Ans. If you want to use another person’s content in an assignment, you must
make sure you have permission to use the content and give credit to the
owner of the work.

3. What is plagiarism?
Ans. Plagiarism means copying or using the work another person and
claiming it as your own.

4. How can using citations improve your work?


Ans. Citations allow you to use the work of others in your own work (as
long as you have permission). They show that you have researched your
work properly.

Grade 7_Chapter 2 (Term2) Page 6 of 7


 Test (Page no. 59)

3. What is a website cookie? What are cookies used for?


Ans. A website cookie is a small file that collects and saves data about how
you use a website, includes:
 To make a website work as intended
 To collect information that will help the website owner improve the
performance of the site.
 To personalize the information (such as new stories) or adverts that
you see on a website.
 To store your location so that you see information about your local
area
 To automatically complete forms with your personal information.

4. Explain how to credit another person’s work.


Ans. To credit another person’s work, include a citation with the name of the
creator of the work, the title of the work, the source of the information and
the date.

5. Explain how cookies can make websites easier to use.


Ans. Cookies collect information about how an individual uses a website.
The information can be used to provide information that is customized to
reflect the user’s previous activity and their location (for example, local
events and whether reports). The information gained from cookies can help
the website owner improve the performance of the website.

6. Explain why intellectual property rights are important to a


photographer.
Ans. Intellectual property rights are important to a photographer because a
photographer earns a living from selling photos. Intellectual property rights
protect the photographer from theft of their images. A photographer makes a
reputation from the quality of their work. Intellectual property rights
enabled them to control what people do with their work. A photographer
wants credit for the photographs they have taken.

******************

Grade 7_Chapter 2 (Term2) Page 7 of 7

You might also like