50 solutions available
Question 1Kuhu has just learnt how to do online banking. Name any two precautions that she should take to prevent online fraud.
Question 2Companies spend a lot on secure data transmission that requires enough technical safeguards.(a) What do you understand by secure data...
Question 3These days it is equally important to safeguard digital properties:(a) What are digital properties?(b) Why is above given statement/fact...
Question 4Freedom of information refers to right to access information available on public platforms.(a) What are the problems that are a hinderance...
Question 1Policies of companies related to protection of personal information of users online are meant to safeguard ............... of...
Question 2Credit card fraud may include :Stealing of credit cardUnauthorized and illegal use of credit cardBoth of the aboveNeither
Question 3Using someone else's twitter handle to post something, will be termed as :FraudIdentity theftOnline stealingViolation
Question 4Standard security protocol that establishes encrypted links between a web server and a browser is called ............... .Online safety...
Question 5Things like these, e.g., online email account, social media account or handle, online shopping account, online photo sharing account,...
Question 6A ............... is an economic and social inequality with regard to access to, use of, or impact of ICT.Digital inequalityDifference of...
Question 7Preeti needs to send a very confidential message to her colleague in office over a secure channel. She uses a technique wherein an actual...
Question 8Which of the following techniques can be used for security of data ?AuthenticationAuthorisationEncryptionAll of the Above
Question 9Which of the following is not a cybercrime ?PlagiarismPhishingUsing licensed softwareHacking
Question 10Secure data transmission means :Data is accessible by any unauthorized person during transmission.Data cannot be accessed by any...
Question 11Which of the following is NOT an example of Intellectual Property rights ?PatentTrademarkPasswordIndustrial Design
Question 12A ............... is the right given by the government to an inventor to protect his/her invention from being used/copied for a fixed...
Question 13Arun clicks on a link received in a message on his phone which promises him a complimentary trip to a destination of his choice. He...
Question 14Charlene is an artist. She displays her artwork on the Internet using her website to attract buyers. One day while browsing the Internet...
Question 15Which of these is NOT an example of Cyber bullying ?Copying a classmate's personal photo against his/her permission from his social media...
Question 16Which of the following is NOT a reason for the digital divide in different demographic regions ?Cost of TechnologyLack of informationLack...
Question 17One of the most popular methods of encrypting data is Caesar cipher where original data is replaced by a key character like if key is -2...
Question 18Which of the following is a way to avoid Plagiarism when using material from the Internet ?(i) Citing(ii) Paraphrasing(iii)...
Question 19............... is a software for which exclusive rights of modification in the source code remain with the owner.Free Open-Source...
Question 20Pratham is excited to use a new software which is freely available to download but he cannot modify or change the source code. Pratham is...
Question 21Which one of the following software comes under Open-Source Software category ?PhotoshopMS-PaintLinuxWindows
Question 1What do you understand by privacy of data in e-commerce context ?
Question 2What role does consumer consent play in implementing the privacy of user data ?
Question 3What is the responsibility of e-commerce merchant to ensure before getting user's consent about his/her details' usage ?
Question 4What is online fraud ? Give some examples.
Question 5What is credit card fraud ?
Question 6What is identity theft ?
Question 7What measures can you take to curb online frauds ?
Question 8What is safe data transmission ? How can you ensure secure data transmission ?
Question 9What is intellectual property ? What do you understand by intellectual property rights ?
Question 10What is plagiarism ? How can you avoid plagiarism while referring to someone's else's creation ?
Question 11What is digital property ? What are the threats to digital properties ?
Question 12How can you protect your digital properties ?
Question 13Expand the terms:OSIFLOSSFSFGNUGPLW3COSS
Question 14What are open source based software ?
Question 15(i)Compare and Contrast: Free software and Open source software
Question 15(ii)Compare and Contrast: OSS and FLOSS
Question 15(iii)Compare and Contrast: Proprietary software and Free software
Question 15(iv)Compare and Contrast: Freeware and Shareware
Question 15(v)Compare and Contrast: Freeware and Free software.
Question 16What is public domain software ?
Question 17Name some common public domain software licenses.
Question 18What is GPL software license ? How is it different from LGPL software license ?
Question 19What is freedom of information ?
Question 20What are the major factors behind digital divide ?
Question 21Write any one application each of e-Governance and e-commerce.