80 solutions available
Question 1Assertion (A): Digital footprints are also termed as Digital Tattoos.Reasoning (R): Digital footprints are the records and traces that we...
Question 2Assertion (A): Privacy of sensitive data can be achieved through proper authentication checks.Reasoning (R): Authentication is the process...
Question 3Assertion (A): FLOSS is an Open Source Software.Reasoning (R): FLOSS source code is freely available and modifiable.Both A and R are true...
Question 4Assertion (A): One should not use copyrighted material without taking a license first.Reasoning (R): A license is described as the...
Question 5Assertion (A): Intellectual property refers to a creation of the intellect (hence, the name); inventions, literary and artistic works,...
Question 6Assertion (A): Plagiarism is a form of IPR infringement.Reasoning (R): Intellectual Property Rights (IPR) infringement is using someone...
Question 7Assertion (A): When a patent is granted, the owner gets an exclusive right to prevent others from modifying, reproducing, selling or...
Question 8Assertion (A): The act of presenting someone else's work or idea as your own is plagiarism.Reasoning (R): Accessing someone's computer...
Question 1Any information about you or created by you that exists in digital form is referred to as Digital Property.
Question 2Stealing someone's intellectual work and representing it as one's own is known as plagiarism.
Question 3Creative creations of the mind such as patents, trademark and copyright are intellectual property.
Question 4Any fraudulent business practice that extracts money from an ignorant person is called a(n) scam.
Question 5Software which usually limit the functionality after a trial period are known as shareware.
Question 6Online identity theft is a theft of personal information in order to commit a fraud.
Question 7Cybercrime is defined as a crime in which computer is the medium of crime (hacking, phishing, spamming) or the computer is used as a tool...
Question 8The practice of attempting to acquire sensitive information from individuals over the internet by means of deception is called phishing.
Question 9Copyright infringement means using another person's work, without permission or without paying for it, if it is being sold.
Question 1Using someone else's Twitter handle to post something will be termed as:FraudIdentity theftOnline stealingViolation
Question 2Standard security protocol that establishes encrypted links between a web server and a browser is called ............... .Online safety...
Question 3Intellectual Property Rights protect the use of information and ideas that are of:Ethical ValueMoral ValueSocial ValueCommercial Value
Question 4Credit card fraud may include:Stealing of credit cardUnauthorized and illegal use of credit cardStealing informationPhishing
Question 5The term "Intellectual Property Rights" covers:CopyrightsTrademarksPatentsAll of these
Question 6Which of the following is an open-source software?Microsoft WindowsAdobe PhotoshopMySQLMS PowerPoint
Question 7Online personal account, personal websites are examples of:Digital WalletDigital PropertyDigital CertificateDigital Signature
Question 8Unsolicited commercial email is known as ............... .SpamMalwareVirusSpyware
Question 9Which of the following is not a type of a cyber crime?Data theftForgeryDamage to dataInstalling antivirus for protection
Question 1What do you mean by cyber crime?
Question 2What is meant by cyber ethics? How are they important to us?
Question 3What do you mean by identity theft? How can we prevent it?
Question 4What do you understand by illegal download?
Question 5What is child pornography?
Question 6How do people unknowingly commit cyber crime?
Question 7What are the different ways to do phishing?
Question 8What precautions should be taken to avoid phishing?
Question 9What procedure is followed by the police to track/investigate cyber crime cases?
Question 10What do you understand by the concept of cyber forensics?
Question 11What precautions should be taken so that students do not indulge in cyber crime unknowingly?
Question 12Differentiate between Proprietary Licence and Open Source Licence.
Question 13How secure is Biometric Authentication System?
Question 14What is the relationship between ethics and law?
Question 15What is the difference between fairness and ethics in law?
Question 16How do ethical norms differ from the law?
Question 17What is the difference between threat, vulnerability and risk?
Question 18What is the goal of information security within an organization?
Question 19In how many ways can you secure your system from cyber attacks?
Question 20Write the advantages of biometrics in school.
Question 21Differentiate between Hacker and Cracker.
Question 22What do you mean by illegal downloads? What are its repercussions?
Question 23What do you mean by virus?
Question 24What do you mean by Spyware and Adware?
Question 25What do you mean by Malware?
Question 26What do you mean by Worm?
Question 27What do you mean by Trojan Horse?
Question 28What is the difference between Worm and Trojan Horse?
Question 29What is the difference between Malware and Worm?
Question 30How does technology impact the society? Explain with the help of an example.
Question 31Write the drawback of social media networks.
Question 32Write the names of five social media sites which are very popular.
Question 33What is plagiarism?
Question 34(a)Write the differences between Phishing and Identity theft.
Question 34(b)Write the differences between Copyright infringement and Trademark Infringement.
Question 34(c)Write the differences between Proprietary and Free and Open-source software.
Question 35Cite examples depicting that you were a victim of following cyber crime. Also, cite provisions in IT Act to deal with such a cyber...
Question 36Name the different types of intellectual property.
Question 37Ravi received a mail from IRS department. On clicking "Click here", he was taken to an official-looking website, like IRS.gov. He uploaded...
Question 38Shreya was not able to attend a class and she called up Rajni enquiring about the topic discussed in the class. Rajni informed her that...
Question 39What do you understand by trademark and intellectual property?
Question 40What is data privacy? Websites that you visit collect what type of information about you?
Question 41What do you mean by confidentiality of information?
Question 42Name some common social networking sites.
Question 43Define digital footprint.
Question 1Public Domain Software is free and can be used with restrictions.
Question 2An important factor of privacy is consumer consent.
Question 3Intellectual Property Rights are the rights of owners to decide how much information/data is to be shared or exchanged.
Question 4Copying and pasting data from internet or other digital resources is ethical.
Question 5E-document becomes legal after it is digitally signed.
Question 6The data stored in biometric database can be updated.
Question 7Source code of proprietary software is normally available.
Question 8Free software is same as freeware.
Question 9Never respond to an email or advertisement that claims you have won something.