Page 209 - CA_165_V2.0_Flipbook
P. 209
4. What is e-Commerce? Explain the steps to achieve a secure data transmission in e-commerce. 5. Which of the following is not a cyber crime? [CBSE SQP 2021]
Ans. e-Commerce, also known as electronic commerce or Internet commerce, refers to the buying or selling of i. Plagiarism ii. Phishing
goods or services over the Internet. Following are the essential requirements for secure data transmission: iii. Using licensed software iv. Hacking
Confidentiality: Information uploaded during e-Commerce transaction should not be accessible to 6. ........................... is software for which exclusive rights of modification in the source code remain with the
an unauthorized user. It should not be intercepted during the transmission of details. owner. [CBSE SQP 2021]
Integrity: Information should not be altered during its transmission over the network. i. Free Open-Source Software ii. Freeware
Authenticity: There should be a mechanism to authenticate a user before giving him/her an access to iii. Open-Source Software iv. Proprietary Software
the required information.
7. Preeti needs to send a very confidential message to her colleague in the office over a secure channel. She
Encryption: Information should be encrypted and decrypted only by an authorized user.
uses a technique wherein an actual message (which is in readable form) is converted into an unreadable
Auditability: Data should be recorded in such a way that it can be audited for integrity requirements. message. This concept is known as ............................ . [CBSE SQP 2021]
C. Application Based Question. i. Encryption ii. Decryption
Raman is working on the Internet. Identify which of the following should be adopted as formal guidelines while iii. Plagiarism iv. Data Security
working on the Internet: 8. R in IPR stands for:
i. Do not send insensible messages.
i. Role ii. Rights
ii. Do not be sensitive while communicating online.
iii. Range iv. RAM
iii. Disclose all personal information.
9. Which of the following can be done to avoid plagiarism? [CBSE SQP 2021]
iv. Never rely the people you meet online, they may not be disclosing their complete identity.
i. Citing all the resources
v. Always respect other people’s privacy.
ii. Properly quoting the content
vi. Always share authentic information only.
iii. Using a plagiarism checker before submitting your work
Ans. i., iv., v. and vi. should be adopted while working online.
iv. All of these
Unsolved Exercise 10. Which of the following techniques can be used for security of data?
ii. Authorisation
i. Authentication
SECTION A iii. Encryption iv. All of these
(Objective Type Questions) B. Fill in the blanks.
A. Multiple choice questions. 1. Information should not be altered during its transmission over the network. This is known
as ............................ .
1. Which of the following techniques can be used for data security? [CBSE SQP 2021]
2. ............................ can be defined as the behaviour or informal guidelines that are followed by the users of the
i. Authentication ii. Authorization
Internet.
iii. Encryption iv. All of these
3. Insensible messages that are sent in a social group or during a chatting are referred as .............................
2. A Firewall is ............................ . 4. ............................ is the authorisation to use a software.
i. Used to protect a computer room from flood and fire 5. Freedom of information Act, 2002 is replaced by ............................ in the year 2005.
ii. A form of virus
C. Assertion and Reasoning questions.
iii. A screen saver
The following questions consist of two statements – Assertion (A) and Reasoning (R). Answer these
iv. None of these questions by selecting the appropriate option given below:
3. Insensible messages that are sent in a social group or during a chat are referred to as ............................ . i. Both Assertion (A) and Reason (R) are true and Reason (R) is the correct explanation of Assertion
i. Spamming ii. Fake messages (A).
iii. Flaming iv. Virus ii. Both Assertion (A) and Reason (R) are true but Reason (R) is not the correct explanation of Assertion
4. Digital property includes ............................ . (A).
i. Emails ii. Spreadsheets iii. Assertion (A) is true, but Reason (R) is false.
iii. Audio files iv. All of these iv. Assertion (A) is false, but Reason (R) is true.
Cyber Ethics 207

