Page 147 - CA 165 ver 1.0 Class 10
P. 147

3.   What is the legal right that covers the privileges of an individual who has created or invented something
                         with his own intellectual ability or creativity and is the owner of his work?

                     4.   What is the full form of EULA?
                     5.   What are unsolicited e-mail messages known as?
                 B.   Case Based MCQs

                       E-commerce, also known as electronic commerce or Internet commerce, refers to the buying or selling of
                     goods  or  services  over  the  Internet.  These  business  transactions  occur  among  business-to-business  (B2B)
                     entity, business-to-consumer (B2C) entity or consumer-to-consumer (C2C) entity. The terms e-commerce and
                     e-Business are often used interchangeably.
                     1.   Which of the following is a very effective and practical way to safeguard the data being transmitted over
                         the network in e-commerce?

                         i.  Decryption                                      ii.  Digital Signature
                         iii.   Encryption                                   iv.  Security Certificate
                     2.   Non delivering of ordered goods and delivering false/damaged goods are types of
                         e- commerce .............................
                         i.  Fraud                                           ii.   Piracy

                         ii.  Privacy                                        iv.   None of these
                     3.   Which of the following is an essential requirement for secure data transmission?
                         i.  Integrity                                       ii.  Confidentiality
                         iii.   Auditability                                 iv.  All of these

                     4.   ............................ means information should not be altered during its transmission over the network.
                         i.  Auditability                                    ii.  Authenticity
                         iii.  Encryption                                    iv.   Integrity
                 C.   Fill in the blanks.

                     1.     Information should not be altered during its transmission over the network. This is known
                         as ............................ .

                     2.    ............................ can be defined as the behavior or informal guidelines that are followed by the users of the
                         Internet.
                     3.   Insensible messages that are sent in a social group or during a chatting are referred as .............................
                     4.    ............................ is the authorization to use a software.
                     5.   Freedom of information Act, 2002 is replaced by ............................ in the year 2005.

                                                                PART B

                 A.   Short answer type questions.
                     1.   Write short notes on:
                         i.  Flaming                                         ii.  Netiquette

                         iii.   Chat and IM                                  iv.   Intellectual Property Right
                         v.   Freedom of Information                         vi.  Digital Divide
                     2.   What is E-mail Netiquette?
                     3..   List the names of Open Source Software License.
                     4.   What is Open Source Software?


                                                                                                  Cyber Ethics   145
   142   143   144   145   146   147   148   149   150   151   152