41 solutions available
Question 1Assertion (A): Viruses are malicious programs.Reasoning (R): Malicious programs are specifically designed to delete, block, modify or copy...
Question 2Assertion (A): An internet troll is a person who deliberately sows discord on the internet by starting quarrels or upsetting...
Question 5Assertion (A): Harassing a person using modern technologies like the internet is called cyber bullying.Reasoning (R): Cyberbullying is not...
Question 6Assertion (A): IT Act 2000 provides legal recognition to electronic commerce.Reasoning (R): IT (Amendment) Act 2008 provides additional...
Question 7Assertion (A): Cyber law is a generic term which refers to all the legal and regulatory aspects of the internet and the World Wide...
Question 3How can one safely browse the internet?
Question 4What are safe browsing tips?
Question 8Write at least four tips of cyber safety.
Question 10What are the possible dangers if cyber safety is overlooked?
Question 14Define cookies.
Question 15How do websites track us?
Question 16Robin searched the net to purchase a wrist watch and a football. Now, whenever he goes online, he is flooded with advertisements about...
Question 17What is meant by gender discrimination? How does it hamper classroom teaching and learning process?
Question 18What do you mean by virus?
Question 19What do you mean by spyware and adware?
Question 20What is the difference between spyware and adware?
Question 21What do you mean by malware?
Question 22What do you mean by worm?
Question 23What do you mean by Trojan horse?
Question 24What is the difference between worm and Trojan horse?
Question 25Explain the difference between malware and worm?
Question 26Why do we need a secure connection while doing netbanking?
Question 27Is WhatsApp secure?
Question 28How will you identify from a URL whether the website you are visiting is safe or not?
Question 29Define secure connection.
Question 30Differentiate between http and https.
Question 31Name any two websites which use https.
Question 32What should we practice to ensure confidentiality of information?
Question 33What do you mean by identity theft?
Question 34How is cyber law implemented in India?
Question 35What is IT Act, 2000?
Question 36What is child pornography?
Question 37How does cybercrime affect our daily life?
Question 38Analyze two cybercrime prevention and protection methods.
Question 39What steps should be taken to protect oneself from online fraud?
Question 40Write four steps to combat cybercrime.
Question 41How is social networking responsible for cybercrime?
Question 9To avoid tracking by website, we should browse internet privately.
Question 11In cyberbullying, a victim is subjected to a barrage of online messages and emails.
Question 12Spreading rumours online is a punishable offence.
Question 13E-waste is very hazardous if not handled carefully.