177 solutions available
Question 1Assertion. The trail of online activity is called Digital Footprint.Reason. Digital footprints are the records of online activities of an...
Question 2Assertion. Copyright, Patents and Trademarks are Intellectual Property Rights.Reason. Intellectual Property Rights are the rights of the...
Question 3Assertion. The patents are available online.Reason. Patents are the grant of exclusive right(s) of an invention.Both A and R are true and R...
Question 4Assertion. Anything available online does not mean it is free and freely available to use.Reason. IPRs do not apply on the online...
Question 5Assertion. Plagiarism is an offense.Reason. Stealing someone's work and showing it as own work is the violation of Intellectual Property...
Question 6Assertion. Open Source Software makes available the source code of the software.Reason. Open source software and free software are the...
Question 7Assertion. Open Source Software and Freeware may come free of cost but they are not the same.Reason. Open Source Software gives source code...
Question 8Assertion. Freeware and Free software mean the same.Reason. Free software may be chargeable.Both A and R are true and R is the correct...
Question 9Assertion. Freeware and free software are different.Reason. Freeware means no cost for the software, while free software means source code...
Question 10Assertion. Viruses, worms, trojans, adware, spyware are all Malware.Reason. Malware is a general term to represent data threat...
Question 11Assertion. Spyware are not harmful as they do not damage data.Reason. Spyware track data about user and sell it to others hampering your...
Question 12Assertion. Phishing is fraudulently taking a user to an authentic looking site and stealing user information.Reason. Pharming is...
Question 13Assertion. One should share information only on encrypted connections and protocols.Reason. HTTPS is a protocol that ensures exchange of...
Question 1The trail that is automatically created when a person uses the internet on any digital devices like Laptops, smart phones, tablets etc. is...
Question 2What is digital footprint ?
Question 3Why is it so important to carefully think of digital footprint ?
Question 4What is intellectual property ? What do you understand by intellectual property rights ?
Question 5Explain plagiarism with an example.
Question 6How can you avoid plagiarism while referring to someone's else's creation ?
Question 7What is digital property ?
Question 8What are the threats to digital properties ?
Question 9How can you protect your digital properties ?
Question 10Expand the terms :OSIFLOSSFSFGNUGPLW3COSS
Question 11What is open source software ? Write the names of any two software which can be categorized as Open Source.
Question 12(i)Compare and Contrast : Free software and Open source software.
Question 12(ii)Compare and Contrast : OSS and FLOSS.
Question 12(iii)Compare and Contrast : Proprietary software and Free software.
Question 12(iv)Compare and Contrast : Freeware and Shareware.
Question 12(v)Compare and Contrast : Freeware and Free software.
Question 13Consider the following scenario and answer the questions which follow :"A student is expected to write a research paper on a topic. The...
Question 14Indian law to deal with cyber crime is :Cyber Act (CA)Internet Act (IA)IT Act (ITA)WWW Act (WWWA)
Question 15E-waste is harmful to the environment and human health if not properly treated or disposed of, therefore they must be handled with care....
Question 16What is public domain software ? Name some common public domain software licenses.
Question 17What is GPL software license ? How is it different from LGPL software license ?
Question 18These days it is equally important to safeguard digital properties :(a) What are digital properties ?(b) Why is above given statement/fact...
Question 19(i)Define Phishing.
Question 19(ii)Define Scam.
Question 19(iii)Define Hacking.
Question 19(iv)Define Spoofing.
Question 20What is cyber crime ? Give examples.
Question 21Can you give an example of crime which is not cyber crime ?
Question 22What is Internet addiction ? What are some symptoms of the Internet addiction ?
Question 23What is cyber bullying ?
Question 24What is copyright ?
Question 25What are some types of software licenses ?
Question 26(i)What are some common net etiquettes ?
Question 26(ii)What do you understand by Net Etiquettes ? Explain any two such etiquettes.
Question 27Nowadays all of us frequently use social media to connect with our friends. Give any two netiquettes that we should follow while...
Question 28What is hacking ? Who is a hacker ?
Question 29List any two health hazards related to excessive use of Technology.
Question 30How does excessive use of technology impact the mental health of a user ?
Question 31How does excessive use of technology impact the physical health of a user ?
Question 32What is a virus ? What is anti-virus software ?
Question 33What is a computer virus ? How can it affect your computer ?
Question 34What type of damages can be caused by viruses to your computer ?
Question 35What are Malware ? What type of damages can they cause to your computer ?
Question 36What is a Spam ? Why has it become a big Internet issue ?
Question 37What is phishing ?
Question 38What is the significance of a firewall in a computer's security scheme ?
Question 1What is digital footprint ?
Question 2What is IPR ?
Question 3What is plagiarism ?
Question 4What is FOSS ?
Question 5How is freeware different from free software ?
Question 6What are open source licenses ?
Question 7What is hacking and spoofing ?
Question 1How is e-waste disposed and recycled ?
Question 2Both email attachments and downloaded files can spread malware.(a) True(b) False
Question 3What is a firewall ?(a) A wall that is reinforced and cannot catch on fire.(b) A program that protects against viruses.(c) A filter for an...
Question 4A strong password should contain :(a) Both uppercase and lowercase letters.(b) A word that is easy to remember, such as the name of a...
Question 5Which type of program can send out information about your web browsing activities or other personal details ?(a) Cookies(b) Spam(c)...
Question 1OSS stands for Open Source Software.
Question 2Any fraudulent business practice that extracts money from an unsuspecting, ignorant person is called a scam.
Question 3Plagiarism is stealing someone else's intellectual work and representing it as your own without giving credit.
Question 4Any work/information that exists in digital form either on Internet or on an electronic device, is known as digital property.
Question 5Discarded electrical or electronic devices are known as e-waste.
Question 6The least restrictive open source license is MIT license.
Question 7The original code written by programmers for a software is known as source code.
Question 8Freeware means no price is to be paid for the software.
Question 9Free Software means freedom to use the software.
Question 10IAD means Internet Addiction Disorder.
Question 11The Digital Footprint is the digital trail of your activity on the Internet.
Question 12The licenses are the permissions given to use a product or someone's creation by the copyright holder.
Question 13Copyleft is a license that gives rights opposite to copyright.
Question 14The practice of taking someone else's work or ideas and passing them off as one's own is known as Plagiarism.
Question 15A Repetitive Strain Injury is an injury or disorder of the muscles, nerves, tendons, ligaments and joints.
Question 16Computer Vision Syndrome is a technology related health condition affecting eyesight.
Question 17Malware is a general term used to refer to viruses, worms, spyware, adware etc.
Question 18A worm is a self-replicating program which eats up the entire disk space or memory.
Question 19Trojan horse is a program that appears harmless (such as a text editor or a utility program) but actually performs malicious functions.
Question 20Spyware is a software which is installed on your computer to spy on your activities and report this data to people willing to pay for it.
Question 21Spamming refers to the sending of bulk-mail by an identified or unidentified source.
Question 22Unauthorised monitoring of other people's communications is called eavesdropping.
Question 23A cookie is a small piece of data sent from a website and stored in a user's web browser (in a text file) while a user is browsing a...
Question 24Firewall is a system designed to prevent unauthorized access to or from a private network.
Question 25A mail or message sent to a large number of people indiscriminately without their consent is called spam.
Question 26Receiving irrelevant and unwanted emails repeatedly is an example of spam.
Question 1............... operating system comes under FOSS.WindowsUbuntuMacOracle
Question 2............... is not a FOSS tool.Libre OfficeMozilla FirefoxGoogle ChromePython
Question 3A software that can be freely accessed and modified is called ............... .Synchronous SoftwarePackage SoftwareOpen Source...
Question 4Data which has no restriction of usage and is freely available to everyone under Intellectual Property Rights is categorized as :Open...
Question 5Technology not protected by copyright and available to everyone, is categorized as :ProprietaryOpen SourceExperimentalShareware
Question 6Which of the following is an advantage of 'open source' software ?You can edit the source code to customize it.You need to be an expert to...
Question 7Which of the following is a disadvantage of 'open source' software ?High quality software with lots of featuresNot as customizableMay not...
Question 8Which of the following is an advantage of 'proprietary' software ?It is usually free.Thoroughly tested because people are paying to use...
Question 9Which of the following is a disadvantage of 'proprietary' software ?You need to be an expert to edit code.You have to pay for this type of...
Question 10The generally recognized term for the government protection afforded to intellectual property (written and electronic) is called...
Question 11Which of the following would be a creative work protected by copyright ?A list of all Indian President namesA portrait of your familyA...
Question 12Which of the following is not a type of cyber crime ?Data theftForgeryDamage to data and systemsInstalling antivirus for protection
Question 13Out of the following, which crime(s) will come under cyber crime category ?Identify theftInvasion of privacyOnline harassmentAll of the...
Question 14Which of the following is not done by cyber criminals ?Unauthorized account accessMass attack using Trojans as botnetsEmail spoofing and...
Question 15What is the name of the IT law that India is having in the Indian legislature ?India's Technology (IT) Act, 2000India's Digital...
Question 16Primary law in India for matters related to e-commerce and cyber crime is :IT Act 1995IT Act 2000IT Act 1998IT Act 2010
Question 17What is meant by the term 'cyber-crime' ?Any crime that uses computers to jeopardize or attempt to jeopardize national securityThe use of...
Question 18Which of the following is a type of cyber crime where objectionable and demeaning comments are posted on social media platform about a...
Question 19What is an example of e-waste ?a ripened bananaan old computerold clothesempty soda cans
Question 20An organisation purchases new computers every year and dumps the old ones into the local dumping yard. Write the name of the most...
Question 21E-waste is responsible for the degradation of our environment if not properly treated or disposed of. Some of the feasible methods of...
Question 22When e-waste such as electronic circuit boards are burnt for disposal, the elements contained in them create a harmful chemical called...
Question 23A company buys old discarded laptops, smartphones, tablets etc. and extracts precious metals from these and recycles these. What type of...
Question 24You were not able to create the IP project, therefore you downloaded a project from the internet and submitted it to your teacher by your...
Question 25The rights of the owner of information to decide how much information is to be shared/exchanged/distributed, are collectively known as...
Question 26Ramandeep is a young woman with great aspirations and has a good team of like-minded people. She along with her team members started a...
Question 27Companies get their Trademark registered to project :logos, names and brandsword, phrase, or symbolslogans, stylized fonts, and...
Question 28Rohit forgot his laptop in his car and when he came back he found his laptop was missing. That act is :Cyber crimePhishingTheftPlagiarism
Question 29The following is automatically granted to the creator or owner of any invention :ParentCopyrightTrademarkLicense
Question 30Himanshi sets up her own company to sell her own range of clothes on instagram. What type of intellectual property can she use to show...
Question 31Stealing someone else's intellectual work and representing it as own, is called ............... .Intellectual...
Question 32The information/art/work that exists in digital form is called ............... .e-worke-assetdigital propertye-property
Question 33The digital footprint that we leave online unintentionally is calledActive digital footprintPassive digital footprintTrue digital...
Question 34Every activity you perform on the Internet is saved for how long ?one monthone yearas per my settingforever
Question 35The digital trail which gets created as a person's Internet usage using computers, smartphones, gaming consoles etc. is called...
Question 36Gaining unauthorized access to a network or computer or digital files with malicious intentions, is called ..................
Question 37Legal term to describe the rights of a creator of original creative or artistic work is called ............... .CopyrightCopyleftGPLNone...
Question 38Copyright, Patent and Trademark comes under :Intellectual Property RightIndividual Property RightIndustrial Property RightNone of the above
Question 39Which attribute is not used with DataFrame ?SizeTypeEmptyColumns
Question 40............... is a non-profit organization that aims to build a publicly accessible global platform where a range of creative and...
Question 41GPL stands for :Guided Public LicenseGeneral Public LicenseGlobal Public LicenseGeneral Public Letter
Question 42E-waste is becoming one of the fastest growing environmental hazards in the world today. If it is not properly treated or disposed of it...
Question 43A worm is ...............A slimy pink thing that lives in dirt.Pieces of malicious code that make copies of themselves and spread through...
Question 44If you receive an email claiming to need your username and/or password, what should you do ?Report it as phishing/spam through your email...
Question 45What should your response be if you receive an email stating that you have won a lottery or received some inheritance from an unknown...
Question 46A computer ............... is a malicious code which self-replicates by copying itself to other programs.programvirusapplicationworm
Question 47Which of the following is a type of program that either pretends to have, or is described as having, a set of useful or desirable features...
Question 48Which of the following is the type of software that has self-replicating software that causes damage to files and system...
Question 49Which of the following tracks your internet browsing habits and sends you popups containing advertisements related to the sites and topics...
Question 50What is the broad term covering computer viruses, worms, trojan, adware, etc. ?MalwareSpywareWormAdware
Question 51The attack that focuses on capturing small packets from the network transmitted by other computers and reading the data content in search...
Question 52Which of the following is/are source of spreading viruses from one computer to another ?EmailInfected dataInfected programsAll of these
Question 53............... are the attempts by individuals to obtain confidential information from you through an original looking site and...
Question 54............... is an attempt where a hacker tries to divert network traffic to a bogus site.Phishing scamsSpoofingEavesdroppingPharming...
Question 55A research student is expected to write a thesis on a topic. The student browses Internet for the topic and luckily finds it on the...
Question 1Open Source Software can be used for commercial purposes.
Question 2It is okay to copy and paste information from the Internet into your report then organize it.
Question 3Shareware software allows you to try the software before you buy it.
Question 4Freeware is copyrighted software that is freely available to use.
Question 5Cyber-laws are incorporated for punishing all types of criminals only.
Question 6Deceptively attempting to acquire sensitive information of someone else using online means, is a cyber crime.
Question 7Freeware and free software mean the same thing.
Question 8Excessive use of Internet and social media is termed as a disorder.
Question 9Digital footprint can be deleted.
Question 10Digital footprint remains forever.
Question 11It is safe to make all one posts public on social media.
Question 12Hacking is performed to help find the security loopholes.
Question 13If you post something mean about someone, you can just delete it and your activity will be undone.
Question 14Hacking is a cyber crime.
Question 15Copyright is the right of the creator of creative/artistic work.
Question 16Computer viruses are healthy codes/programs written to test the security health of a system.
Question 17A worm is a self-replicating program.
Question 18A trojan horse is a utility program that does harm when its date gets expired.
Question 19Spyware is healthy software which keeps an eye on activities happening on your computer.
Question 20Adware are the programs that deliver unwanted ads to your computer.
Question 21Malware is a special type of virus.
Question 22Spamming refers to the sending of bulk-mail by an identified or unidentified source.
Question 23Phishing involves authentic looking sites trying to collect your sensitive transactional and identity information.
Question 24To keep a computer protected, one should use updated software, be cautious while handling mails and surfing Internet, scanning computer...
Question 25Firewall can be implemented in software as well as in hardware.