52 solutions available
Question 1Successful security solutions require a convergence of three components. Name these components.
Question 2What are the most common forms of identification and authentication.
Question 3Name the process of transforming data into an unreadable code.
Question 4Name the term for any digital information related to you or created by you, which may be stored online?
Question 5Which type of licences offer users the right to run, study, share, modify, and distribute copies and modified versions of the software with...
Question 6What is the other name for literary theft?
Question 7Name the term used for the right to seek, receive, and impart information and ideas, through any media.
Question 8Which type of software has no ownership or copyright associated with it?
Question 9Give the full form of BSD licences.
Question 10When the user does not really understand how to properly paraphrase, quote, and cite the research, which type of plagiarism is he...
Question 1Asmita belongs to an affluent family, and she wants to do something to bridge the digital divide in her community. What can she do at an...
Question 2Abhay is going to make his first Online purchase. How should his parents guide to make him aware of the common e-commerce frauds? List the...
Question 1............... is a system of moral principles that differentiates between good and bad practices.
Question 2............... to practice ethical code of conduct constitutes fraud.
Question 3............... is a technique used to retrieve personal information of a user from his discarded documents.
Question 4............... is stealing confidential, personal, and financial information from a computer or a mobile phone and misusing it to harm the...
Question 5............... is obtaining personal information through direct observation by looking over a person's shoulder.
Question 6HTTPS Protocol encrypts the information or data using a ............... certificate.
Question 7............... software are computer programs which identify, prevent, and remove viruses from our computer.
Question 8Encrypted data is referred to as ............... text.
Question 9When the same sentence structure is used with synonyms for the appropriate words of the sentence, it is called ............... plagiarism.
Question 10The simplest way to prevent plagiarism is the ............... method.
Question 1Which of the following is not a form of software piracy?SoftliftingCounterfeitingHard Disk LoadingEncrypting
Question 2............... is the process of transforming data into an unreadable code.CopyrightTrademarkEncryptionInformation Security
Question 3............... refers to flooding the user's inbox with unwanted advertisements and messages.SpammingVirusHackingPatent
Question 4The right which is concerned with the design and algorithm of the product rather than the entire product is called ..................
Question 5E-commerce stands for ............... .Electrical CommerceElectronic commerceEthical CommerceNone of these
Question 6When someone else uses your online identity to create fraudulent messages or commit crimes, it is known as ............... .Identity...
Question 7............... is defined as the right to control what happens with your personal information.PretextingPrivacyPiracyPatent
Question 8............... licences are a family of permissive free software licences.MITApacheGNUBSD
Question 9............... software is a copyrighted software.PrivateProprietaryPrivacyProtective
Question 10............... Rights refer to intellectual property rights given to persons over the digital property created by...
Question 1Plagiarism may occur due to a lack of interest in one's work.
Question 2Piracy is concerned with personal information.
Question 3Patent for innovations is an Industrial property.
Question 4We should never share our password and PIN number with unauthorised personnels.
Question 5Encryption is the process of transforming data into a readable code.
Question 6The Internet offers us convenient ways to shop from our homes or offices for almost everything.
Question 7Good ethics means that the company provides the most reliable information about products or services.
Question 8Doing business legally and ethically only benefits the customers and not the company.
Question 9Renting means unauthorised sharing of software for temporary use for some nominal charges.
Question 10Apache licence version 2.0 is an open source software licence.
Question 1What is fraud? Cite any two reasons why online fraud has been increasing.
Question 2Enlist any three netiquettes to be followed when online.
Question 3Define Plagiarism. Write any three steps to prevent plagiarism.
Question 4Define Identity theft.
Question 5What is the difference between an Open Source and Free software?
Question 6Explain the philosophy of Open Source. Enlist any four criteria that qualifies a program to be Open source software.
Question 7What do you mean by Digital Property Rights?
Question 8Mention any three ways to bridge the digital divide.
Question 9What is Proprietary software? Mention three features of proprietary software.
Question 10What do you mean by copyleft licences?