Q.1. Name five common intellectual property rights. (1 Mark)
Ans: Copyrights, patents, trademarks, trade secrets, industrial designs.
Q.2. What are Internet trolls? (1 Mark)
Ans: Internet trolls post messages and comments that try to evoke an emotional response from other people. BBC presenter Richard Bacon and other celebrities have spoken about being victims of trolls.
Q.3. What is a patent? (1 Mark)
Ans: A patent is a form of right granted by the government to an inventor to protect his/her invention. It gives the holder the right to prevent anyone else from using it for a fixed period.
Q.4. Define data encryption. (1 Mark)
Ans: Encryption scrambles the data on computers while transferring on a network. It is used to hide a message from an unintended recipient.
Q.5. What is copyright? (1 Mark)
Ans: A copyright protects artistic and literary work. Copyright shall expire after 70 years of the last author ‘s death.
Q.6. Name two security threats in a network. (1 Mark)
Ans: Denial of service attacks and snooping.
Q.7. What is trademark? (1 Mark)
Ans: Trademarks are distinctive phrases, words, symbols or signs. They distinguish services or products of one company from the others. Brands usually associate with distinctive trademarks.
Q.8. How does firewall protect us from network security threats? (1 Mark)
Ans: Firewalls help to filter the traffic by forming a barrier between a trusted and an untrusted network. It can be hardware or software or both.
Q.9. What is piracy? (1 Mark)
Ans: The unauthorised use of another person’s work is known as piracy.
Q.10. Geetu is an artist. She posts her artwork on the Internet. One day she comes to know that Shreyas has downloaded one of the paintings that she has posted without her permission. He had further printed that image on an invitation card. Has Shreyas does the right thing ? Which right of Geetu has he infringed? (1 Mark)
Ans: No, Shreyas has not done right thing. Intellectual Property Rights can be used by Geetu.
Q.11. What is information security? (1 Mark)
Ans: Information security is about protecting and preserving information. It also ensures preserving the confidentiality, authenticity, availability and reliability of information.
Q.12. Define the term digital divide. (1 Mark)
Ans: The gap between technical knowledge of the people who have access to computers and Internet and those who do not have that access.
Q.13. What is cyber crime? (1 Mark)
Ans: Cybercrime consists of using the internet for wrong intentions. It includes e-mail spoofing, cyber defamation, sending threatening emails, etc
Q.14. Ritwik wants to use a software but does not want to pay for it. Which type of software can he use? (1 Mark)
Ans: Open Source Software
Q.15. What is a digital certificate? (1 Mark)
Ans: Digital certificates are electronic files containing user‘s name, user’s public key and name of certification authority, etc that acts as an online passport.
Q.16. Riya wants to buy and sell goods online, which term is used to describe this process? (1 Mark)
Q.17. What is cyber bullying? (1 Mark)
Ans: Cyber bullying involves abuse of another person using threats, insults and hurtful remarks and messages over the internet. There have been numerous reports of people who have been driven to suicide by persistent cyber bullying.
Q.18. Raman is an employee of ABC company. He wants a software for which he paid. What type of software is Raman using? (1 Mark)
Ans: Raman is using proprietary software.
Q.19. What is netiquette? (1 Mark)
Ans: The word netiquette is a combination of ’net’ (from internet) and ’etiquette’. It means respecting other users’ views and displaying courtesy when posting your views to online discussion groups.
Q.20. What is SET? (1 Mark)
Ans: SET is Secure Electronic Transaction. It is a system for ensuring the security of financial transactions on the Internet.
Q.21. What is computer ethics? (1 Mark)
Ans: Computer ethics is a set of moral principles that governs the behaviour of a group or individual that regulate the use of computers. These are like intellectual property rights, privacy concerns and how computers affect society.
Q.22. What is privacy in e-Commerce? (1 Mark)
Ans: Privacy in e-Commerce means the protection of privacy of all the parties involved in trading through e-Commerce.
Q.23. What is intellectual property? (1 Mark)
Ans: Intellectual property refers to creations of the mind i.e. inventions; literary and artistic works; symbols, names and images used in commerce.
Q.24. What is SSL? (1 Mark)
Ans: Secure Socket Layer (SSL) is a security protocol developed by Netscape Communications to protect communication over the internet.