Page 44 - CA 165 ver 1.0 Class 10
P. 44
B. Case Based MCQs
Internet Protocols
Geetika has recently created her social accounts. She is very excited as she waited so long to go online. She has
recently also got admission in a prestigious high school and does not know many students. When she logs into
her social media a few days later, she finds that someone is posting negative, demeaning comments on her
social media profile. She is also getting repeated mails from unknown people. Whenever she goes online, she
is trolled by multiple unknown people. [CBSE SQP 2021-22]
1. Geetika is a victim of ..................................... .
i. Eavesdropping ii. Plagiarism
iii. Phishing iv. Cyber stalking
2. Which of the following is the most appropriate action she should take?
i. She should stop going online and delete her social media accounts.
ii. She should NOT share this with anyone as she might face more of such kind of behaviour.
iii. She should file a complaint at the nearest police station.
iv. She should inform her parents and bring to the notice of school authorities.
3. After hearing her ordeal, the school decides to publish a set of moral principles that determines the
appropriate behaviour of students while using the internet. The school is referring to .................................... .
i. Intellectual Property rights ii. Internet Privacy
iii. Computer Ethics iv. Cyber Ethics
4. Geetika is advised by her best friend, Seerat to protect her personal information from intentional or
unintentional attacks by others. This is also known as ..................................... .
i. Digital right ii. Copyright
iii. Data Privacy iv. Intellectual property
5. The computer teacher of Geetika’s class decides to take an online session on the topic Netiquettes, which
generally includes ..................................... .
i. safeguarding one’s passwords and sensitive online information
ii. logging out of social media accounts after the session
iii. not bullying or trolling anyone by disrespecting them or passing inappropriate remarks
iv. All of the above
C. Fill in the blanks.
1. Internet is also referred to as ..................................... .
2. The first page of a website is called as ..................................... .
3. ..................................... is a text only mode web browser.
4. ..................................... are used for the sole purpose of spamming.
5. Text Based addressing system on internet is called ..................................... .
6. MTA stands for ..................................... .
7. SSH protocol is also known as ..................................... .
42 Touchpad Computer Applications-X

