45 solutions available
Question 1Assertion (A): Digital footprints are also termed as Digital Tattoos.Reasoning (R): Digital footprints are the records and traces that we...
Question 5Assertion (A): Intellectual property refers to a creation of the intellect (hence, the name); inventions, literary and artistic works,...
Question 7Assertion (A): When a patent is granted, the owner gets an exclusive right to prevent others from modifying, reproducing, selling or...
Question 4Credit card fraud may include:Stealing of credit cardUnauthorized and illegal use of credit cardStealing informationPhishing
Question 2What is meant by cyber ethics? How are they important to us?
Question 3What do you mean by identity theft? How can we prevent it?
Question 6How do people unknowingly commit cyber crime?
Question 8What precautions should be taken to avoid phishing?
Question 9What procedure is followed by the police to track/investigate cyber crime cases?
Question 10What do you understand by the concept of cyber forensics?
Question 11What precautions should be taken so that students do not indulge in cyber crime unknowingly?
Question 12Differentiate between Proprietary Licence and Open Source Licence.
Question 13How secure is Biometric Authentication System?
Question 14What is the relationship between ethics and law?
Question 15What is the difference between fairness and ethics in law?
Question 16How do ethical norms differ from the law?
Question 17What is the difference between threat, vulnerability and risk?
Question 18What is the goal of information security within an organization?
Question 19In how many ways can you secure your system from cyber attacks?
Question 20Write the advantages of biometrics in school.
Question 21Differentiate between Hacker and Cracker.
Question 22What do you mean by illegal downloads? What are its repercussions?
Question 23What do you mean by virus?
Question 24What do you mean by Spyware and Adware?
Question 25What do you mean by Malware?
Question 26What do you mean by Worm?
Question 27What do you mean by Trojan Horse?
Question 28What is the difference between Worm and Trojan Horse?
Question 29What is the difference between Malware and Worm?
Question 30How does technology impact the society? Explain with the help of an example.
Question 31Write the drawback of social media networks.
Question 32Write the names of five social media sites which are very popular.
Question 33What is plagiarism?
Question 34(a)Write the differences between Phishing and Identity theft.
Question 34(b)Write the differences between Copyright infringement and Trademark Infringement.
Question 34(c)Write the differences between Proprietary and Free and Open-source software.
Question 35Cite examples depicting that you were a victim of following cyber crime. Also, cite provisions in IT Act to deal with such a cyber...
Question 36Name the different types of intellectual property.
Question 37Ravi received a mail from IRS department. On clicking "Click here", he was taken to an official-looking website, like IRS.gov. He uploaded...
Question 38Shreya was not able to attend a class and she called up Rajni enquiring about the topic discussed in the class. Rajni informed her that...
Question 39What do you understand by trademark and intellectual property?
Question 40What is data privacy? Websites that you visit collect what type of information about you?
Question 41What do you mean by confidentiality of information?
Question 42Name some common social networking sites.
Question 43Define digital footprint.