Q1: Multiple Choice Questions (MCQs)
1. Which of the following is NOT a form of e-commerce fraud?
a) Credit card fraud
b) Refund fraud
c) Secure Socket Layer (SSL) fraud
d) Identity theft
Q2: What technology is used to keep messages secret from unauthorized access in e-commerce?
a) Digital signature
b) Encryption
c) Digital certificate
d) Phishing
Q3: What does the term "FLOSS" stand for?
a) Free/Libre Open Source Software
b) Free Licensed Operating System Software
c) Fully Licensed Open Source Software
d) Free Logical Operating System Software
Q4: Which of the following is a legal right protecting creators' original works?
a) Netiquette
b) Digital divide
c) Intellectual property rights
d) Anonymity
Q5: The Right to Information Act in India was implemented in which year?
a) 2002
b) 2005
c) 2010
d) 2015
Q2: Fill in the Blanks
1. ______ is an intentional false representation of a fact.
2. ______ refers to good manners in online communication.
3. A ______ is a digital code that ensures the authenticity of the information.
4. ______ is the unlawful intrusion into a computer or a network.
5. ______ software is licensed at no cost, or for an optional fee, but usually does not provide source code.
Q3: Match the Columns
Answers:
1. Phishing - d. Deceiving users to reveal personal information
2. Spyware - a. Collecting data from a computer secretly
3. Hacking - b. Unlawful intrusion into a computer
4. Plagiarism - c. Stealing and publication of another's work
5. Malware - e. Malicious software
Q4: True/False
1. Encryption ensures that the data being sent over the internet cannot be accessed by unauthorized parties.
2. The term "Digital Divide" refers to the legal rights protecting creators' works.
3. Open source software is usually closed source and only available to those who purchase it.
4. The GNU General Public License aims to ensure that software remains free for all its users.
5. Anonymity on the internet is a way of keeping a user's identity masked through various applications.
11 videos|49 docs|18 tests
|
1. What are cyber ethics? |
2. Why is it important to practice cyber ethics? |
3. How can individuals promote cyber ethics in their daily online activities? |
4. What are some common ethical dilemmas people face in the digital age? |
5. How can schools and organizations promote cyber ethics among students and employees? |
|
Explore Courses for Class 10 exam
|