90 solutions available
Question 1Assertion (A): Viruses are malicious programs.Reasoning (R): Malicious programs are specifically designed to delete, block, modify or copy...
Question 2Assertion (A): An internet troll is a person who deliberately sows discord on the internet by starting quarrels or upsetting...
Question 3Assertion (A): Social media are websites or applications that enable users to participate in social networking but they cannot create and...
Question 4Assertion (A): Cyberstalkers collect all personal information of the victim.Reasoning (R): Cyberstalkers post the email of the victim on...
Question 5Assertion (A): Harassing a person using modern technologies like the internet is called cyber bullying.Reasoning (R): Cyberbullying is not...
Question 6Assertion (A): IT Act 2000 provides legal recognition to electronic commerce.Reasoning (R): IT (Amendment) Act 2008 provides additional...
Question 7Assertion (A): Cyber law is a generic term which refers to all the legal and regulatory aspects of the internet and the World Wide...
Question 1Threat is a potential violation of security.
Question 2Stealing of information is an example of Cybercrime.
Question 3A self-replicating program that eats up the entire disk space or memory is called worm.
Question 4Spyware is a software which is installed on your computer to spy on your activities.
Question 5A Trojan Horse is a program that appears harmless but actually performs malicious functions.
Question 6Spamming refers to sending of bulk mails by an identified or unidentified source.
Question 7Most hackers crack passwords of system accounts and gain entry into remote computer systems.
Question 8When we visit certain websites with advertisements, the ads create cookies that store and track our online patterns.
Question 9Ensuring that users or customers provide information that is associated with identity of a real person is known as identity verification.
Question 10If the user is able to provide a legal email id, he is considered a/an authorized user.
Question 11Unauthorized monitoring of other people's communication is known as eavesdropping.
Question 12Flooding a system with junk mail is a Denial-of-Service type of attack.
Question 13A Super cookie is a type of browser cookie that is designed to be permanently stored on a user's computer and difficult to detect and...
Question 14Discarded electronic devices are called e-waste.
Question 1This term refers to safe and responsible use of technology.Cyber userCyber presentCyber safetyCyber logic
Question 2This is a type of fraud that involves using someone else's identity to gain other benefits.Personal theftInformation theftCyber...
Question 3These are the small text files for storing a small piece of information related to someone's online habits.SpywareVirusCookiesSpam
Question 4This is a unique address, assigned to every computer when connected to a network.MAC addressComputer nameURL addressIP address
Question 5This term ensures that only authorized users get access to sensitive and protected data.SafetyProtectionConfidentialityProvide
Question 6This is a criminal offence that is facilitated by, or involves the use of, electronic communications or information system, including any...
Question 7Which of the following is not an external threat to a computer or a computer network.IgnoranceTrojan horseAdwareCrackers
Question 8When a person is harassed repeatedly by being followed, called or written to, he/she is a target of:BullyingIdentity theftStalkingPhishing
Question 9What is the name of the IT law that India is having in the Indian legislature?Indian Technology (IT) Act, 2000Digital Information...
Question 10This term refers to a person who purposely posts opposing, sarcastic, demeaning or insulting comments about something or someone.Cyber...
Question 11These are the records and traces an individual leaves behind as they use the internet.Digital pathDigital mapDigital footDigital footprints
Question 12Unauthorized monitoring of other people's communication is called:SpammingMalwareAdwareEavesdropping
Question 13Sending of unsolicited bulk and commercial messages over the internet is ............... .StalkingPhishingSpammingSpoofing
Question 14Child pornography is prohibited by ............... of IT Act, 2000.Sec. 64Sec. 65Sec. 66Sec. 67B
Question 15Cybercrime is a crime in which computer is used as a:ToolTargetBoth (1) and (2)None of these
Question 1Should we use incognito window during surfing?
Question 2State whether True or False.(a) IP address helps trace our geographical area.(b) Cookies store our online habits.(c) Using strong internet...
Question 3How can one safely browse the internet?
Question 4What are safe browsing tips?
Question 5Is Google Chrome safe for browsing?
Question 6Do you feel safe on the internet?
Question 7Define cyber safety.
Question 8Write at least four tips of cyber safety.
Question 9What is private browsing?
Question 10What are the possible dangers if cyber safety is overlooked?
Question 11What is the role of IP Address in networking?
Question 12What do you mean by confidentiality of information?
Question 13What is the role of firewall?
Question 14Define cookies.
Question 15How do websites track us?
Question 16Robin searched the net to purchase a wrist watch and a football. Now, whenever he goes online, he is flooded with advertisements about...
Question 17What is meant by gender discrimination? How does it hamper classroom teaching and learning process?
Question 18What do you mean by virus?
Question 19What do you mean by spyware and adware?
Question 20What is the difference between spyware and adware?
Question 21What do you mean by malware?
Question 22What do you mean by worm?
Question 23What do you mean by Trojan horse?
Question 24What is the difference between worm and Trojan horse?
Question 25Explain the difference between malware and worm?
Question 26Why do we need a secure connection while doing netbanking?
Question 27Is WhatsApp secure?
Question 28How will you identify from a URL whether the website you are visiting is safe or not?
Question 29Define secure connection.
Question 30Differentiate between http and https.
Question 31Name any two websites which use https.
Question 32What should we practice to ensure confidentiality of information?
Question 33What do you mean by identity theft?
Question 34How is cyber law implemented in India?
Question 35What is IT Act, 2000?
Question 36What is child pornography?
Question 37How does cybercrime affect our daily life?
Question 38Analyze two cybercrime prevention and protection methods.
Question 39What steps should be taken to protect oneself from online fraud?
Question 40Write four steps to combat cybercrime.
Question 41How is social networking responsible for cybercrime?
Question 1Computer security is protecting the integrity, availability and confidentiality of information system.
Question 2Identity theft is a type of fraud.
Question 3Browsing through VPN is anonymous browsing.
Question 4Persistent cookies are different from super cookies.
Question 5Posting something leaves behind traces which are called digital footprints.
Question 6A person who posts derogatory messages online targeting people is called a cyber troller.
Question 7Online theft refers to an act of stealing someone's personal information.
Question 8A firewall only monitors incoming communication.
Question 9To avoid tracking by website, we should browse internet privately.
Question 10We can share sensitive information on wireless networks.
Question 11In cyberbullying, a victim is subjected to a barrage of online messages and emails.
Question 12Spreading rumours online is a punishable offence.
Question 13E-waste is very hazardous if not handled carefully.