Page 44 - CA 165 ver 1.0 Class 10
P. 44

B.  Case Based MCQs
                                                           Internet Protocols

                        Geetika has recently created her social accounts. She is very excited as she waited so long to go online. She has
                      recently also got admission in a prestigious high school and does not know many students. When she logs into
                      her social media a few days later, she finds that someone is posting negative, demeaning comments on her
                      social media profile. She is also getting repeated mails from unknown people. Whenever she goes online, she
                      is trolled by multiple unknown people.                                         [CBSE SQP 2021-22]

                      1.   Geetika is a victim of ..................................... .
                          i.   Eavesdropping                                  ii.   Plagiarism
                          iii.   Phishing                                     iv.   Cyber stalking
                      2.   Which of the following is the most appropriate action she should take?

                          i.   She should stop going online and delete her social media accounts.
                          ii.   She should NOT share this with anyone as she might face more of such kind of behaviour.
                          iii.   She should file a complaint at the nearest police station.
                          iv.   She should inform her parents and bring to the notice of school authorities.
                      3.    After  hearing  her  ordeal,  the  school decides to publish a  set of moral principles that  determines the
                          appropriate behaviour of students while using the internet. The school is referring to .................................... .

                          i.   Intellectual Property rights                   ii.   Internet Privacy
                          iii.   Computer Ethics                              iv.   Cyber Ethics
                      4.    Geetika  is advised  by  her  best  friend,  Seerat  to  protect  her  personal information  from intentional  or
                          unintentional attacks by others. This is also known as ..................................... .
                          i.   Digital right                                  ii.   Copyright
                          iii.   Data Privacy                                 iv.   Intellectual property

                      5.    The computer teacher of Geetika’s class decides to take an online session on the topic Netiquettes, which
                          generally includes ..................................... .
                          i.  safeguarding one’s passwords and sensitive online information
                          ii.  logging out of social media accounts after the session
                          iii.  not bullying or trolling anyone by disrespecting them or passing inappropriate remarks
                          iv.  All of the above

                  C.   Fill in the blanks.
                      1.   Internet is also referred to as ..................................... .
                      2.   The first page of a website is called as ..................................... .

                      3.  ..................................... is a text only mode web browser.
                      4.  ..................................... are used for the sole purpose of spamming.
                      5.   Text Based addressing system on internet is called ..................................... .
                      6.   MTA stands for ..................................... .
                      7.   SSH protocol is also known as ..................................... .










                   42    Touchpad Computer Applications-X
   39   40   41   42   43   44   45   46   47   48   49