55 solutions available
Question 8Assertion. Freeware and Free software mean the same.Reason. Free software may be chargeable.Both A and R are true and R is the correct...
Question 10Assertion (A): Social media are websites or applications that enable their users to participate in social networking but they cannot...
Question 3Why is it so important to carefully think of digital footprint ?
Question 9How can you protect your digital properties ?
Question 12(ii)Compare and Contrast : OSS and FLOSS.
Question 12(iv)Compare and Contrast : Freeware and Shareware.
Question 18These days it is equally important to safeguard digital properties :(a) What are digital properties ?(b) Why is above given statement/fact...
Question 20What is cyber crime ? Give examples.
Question 22What is Internet addiction ? What are some symptoms of the Internet addiction ?
Question 26(i)What are some common net etiquettes ?
Question 26(ii)What do you understand by Net Etiquettes ? Explain any two such etiquettes.
Question 27Nowadays all of us frequently use social media to connect with our friends. Give any two netiquettes that we should follow while...
Question 28What is hacking ? Who is a hacker ?
Question 29List any two health hazards related to excessive use of Technology.
Question 30How does excessive use of technology impact the mental health of a user ?
Question 31How does excessive use of technology impact the physical health of a user ?
Question 32What is a virus ? What is anti-virus software ?
Question 33What is a computer virus ? How can it affect your computer ?
Question 34What type of damages can be caused by viruses to your computer ?
Question 35What are Malware ? What type of damages can they cause to your computer ?
Question 36What is a Spam ? Why has it become a big Internet issue ?
Question 37What is phishing ?
Question 38What is the significance of a firewall in a computer's security scheme ?
Question 4Jayati Chatterjee is studying digital footprints. Help her clarify the concepts of digital footprints.(i) Digital footprints are also known...
Question 5Neetu has recently shifted to a new city and a new school. She does not know many people there. However, someone starts posting negative,...
Question 1How is e-waste disposed and recycled ?
Question 28Rohit forgot his laptop in his car and when he came back he found his laptop was missing. That act is :Cyber crimePhishingTheftPlagiarism
Question 30Himanshi sets up her own company to sell her own range of clothes on instagram. What type of intellectual property can she use to show...
Question 31Stealing someone else's intellectual work and representing it as own, is called ............... .Intellectual...
Question 32The information/art/work that exists in digital form is called ............... .e-worke-assetdigital propertye-property
Question 47Which of the following is a type of program that either pretends to have, or is described as having, a set of useful or desirable features...
Question 48Which of the following is the type of software that has self-replicating software that causes damage to files and system...
Question 49Which of the following tracks your internet browsing habits and sends you popups containing advertisements related to the sites and topics...
Question 50What is the broad term covering computer viruses, worms, trojan, adware, etc. ?MalwareSpywareWormAdware
Question 51The attack that focuses on capturing small packets from the network transmitted by other computers and reading the data content in search...
Question 52Which of the following is/are source of spreading viruses from one computer to another ?EmailInfected dataInfected programsAll of these
Question 53............... are the attempts by individuals to obtain confidential information from you through an original looking site and...
Question 54............... is an attempt where a hacker tries to divert network traffic to a bogus site.Phishing scamsSpoofingEavesdroppingPharming...
Question 55A research student is expected to write a thesis on a topic. The student browses Internet for the topic and luckily finds it on the...
Question 2What is meant by cyber ethics? How are they Important for us?
Question 6How is cyber law implemented in India?
Question 7What is IT Act, 2000 of India?
Question 11How would you recognize if one of your friends is being cyberbullied?(a) Cite the online activities which would help you detect that your...
Question 12(a)Differentiate between Copyrights and Patents.
Question 12(c)Differentiate between Ethical and Non-ethical Hacking.
Question 12(e)Differentiate between Free Software and Free and Open Source Software.
Question 13When you search for pictures online, how will you find pictures that are in the public domain? How can those pictures be used in your...
Question 14Describe why it is important to secure your wireless router at home. Search the internet for rules to create a reasonably secure password....
Question 15What precautions should be taken by people to avoid phishing?
Question 16What procedure is followed by the police to track/investigate cybercrime cases?
Question 17What precautions should be taken so that students do not indulge in cybercrime unknowingly?
Question 19Differentiate between Proprietary License and Open Source License.
Question 20How is internet affecting one’s daily life? Give one example each of positive and negative aspects of internet.
Question 22List at least three emotional and physical symptoms of internet addiction.
Question 25Firewall can be implemented in software as well as in hardware.