Page 149 - CA 165 ver 1.0 Class 10
P. 149
B. Long answer type questions. 6. Term ............................ refers to the gap between these who have access to ICTs and those who don’t: [CBSE, 2022]
1. Differentiate between the following: (a) Internet Gap (b) Internet Divide
i. Proprietary and Shareware Software (c) Digital Divide (d) Technology Divide
ii. OSS and FOSS 7. Which of the following will come under IPR? [CBSE, 2022]
2. Explain the 4 Freedom essential to make a software as ‘Freeware’. (a) Trademark (b) Patent
3. Explain Open Source Movement. (c) Copyright (d) All of the above
4. Explain the ethical conduct to be followed while doing e-Commerce. 8. A unique symbol or word used to represent a business or its products is known as: [CBSE, 2022]
C. Application based questions. (a) Patent (b) Trademark
1. Crystal is a company that sells televisions from its websites. Senorita buys a television from the Crystal (c) Copyright (d) None of the above
website. What is this way of shopping called? 9. Manish has copied the information the resource available on the internet for his article without acknowledging the
2. Sneha is a very social girl who likes to make new friends and interact with them. Suggest a web service original source or taking the permission from the original creator. This unethical termed as: [CBSE, 2022]
using which she can make new friends. Also, suggest one necessary precaution that she should keep in (a) Phishing (b) Elagrothim
mind while using the service.
(c) Spying (d) Identity theft
Previous Years’s Questions 10. Encryption is one of the most prominent technique used for: (b) secure data transmission [CBSE, 2022]
(a) fast data transmission
(c) far away data transmission (d) free data transmission
1. Identify the correction statement regarding OSS: [CBSE, 2022]
11. GIMP, Mozilla Firefox, GNU/Linux, Python to come under: [CBSE, 2022]
(a) It is available for nominal or zero licensing and usage charges
(a) Freeware (b) FUSS
(b) It can be shared with others freely
(c) Shareware (d) Proprietor
(c) It is modifiable
12. The process of converting the original representation of the information (plaintext), into an alternative form
(d) All of the above (ciphertext) is known as: [CBSE, 2022]
2. ............................ are the rights given in persons over the creations of their minds: [CBSE, 2022] (a) Encryption (b) Decryption
a. Creative rights (b) Intellectual property rights (c) Phishing (d) Plagiarism
c. Intellectual creative rights (d) Creative property rights 13. Statement1: FOSS is more user friendly as compared to Proprietary software.
3. Name the activity of electronically buying or selling of products on online services or over the Internet. [CBSE, 2022] Statement 2: Proprietary software allows developers access the globe to participate in the origining development of
(a) Cyber Commerce (b) e-Commerce the software
(c) Internet business (d) Electric commerce Select the best option from the list given below to understand the corrections of both the statements: [CBSE, 2022]
4. This kind of software is freely distributed to users on a trial basis. (a) Both statements are Correction
There’s a time limitation inherent in the software and would be deactivated when the time period is finished. (b) Statement 1-Correct & Statement 2 Incorrect
One has to pay for the software to use it after the time limit. [CBSE, 2022] (c) Statement 1-Incorrect & Statement 2 Correct
Identify the type of software: (d) Statement 1-Incorrect & Statement-2 Incorrect
(a) OSS (b) Proprietary 14. Which of the following is Privacy threat to e-commerce? [CBSE, 2022]
(c) Freeware (d) Shareware (a) Password theft (b) Identity theft
5. Select the e-commerce fraud from the following list: [CBSE, 2022] (c) Phishing (d) All of the above
(a) Payment fraud (b) Identify Theft 15. Nowadays we spend more time in the cyber world. Anyone who uses digital technology along with the Internet is a
(c) Phishing (d) All of the above digital citizen or a netizen. Being a good netizen means practicing safe, ethical and legal use of digital technology. A
responsible netizen must abide by net etiquettes communication etiquettes and social media etiquettes.
Cyber Ethics 147

