Page 209 - CA_165_V2.0_Flipbook
P. 209

4.     What is e-Commerce? Explain the steps to achieve a secure data transmission in e-commerce.      5.   Which of the following is not a cyber crime?   [CBSE SQP 2021]
   Ans.   e-Commerce, also known as electronic commerce or Internet commerce, refers to the buying or selling of         i.  Plagiarism   ii.  Phishing
 goods or services over the Internet. Following are the essential requirements for secure data transmission:        iii.  Using licensed software   iv.  Hacking
        Confidentiality: Information uploaded during e-Commerce transaction should not be accessible to      6.     ........................... is software for which exclusive rights of modification in the source code remain with the
 an unauthorized user. It should not be intercepted during the transmission of details.  owner.       [CBSE SQP 2021]
       Integrity: Information should not be altered during its transmission over the network.        i.  Free Open-Source Software   ii.  Freeware
       Authenticity: There should be a mechanism to authenticate a user before giving him/her an access to         iii.  Open-Source Software   iv.  Proprietary Software
 the required information.
                     7.     Preeti needs to send a very confidential message to her colleague in the office over a secure channel. She
       Encryption: Information should be encrypted and decrypted only by an authorized user.
                         uses a technique wherein an actual message (which is in readable form) is converted into an unreadable
       Auditability: Data should be recorded in such a way that it can be audited for integrity requirements.  message. This concept is known as ............................ .   [CBSE SQP 2021]
 C.  Application Based Question.        i.  Encryption                       ii.  Decryption

 Raman is working on the Internet. Identify which of the following should be adopted as formal guidelines while         iii.  Plagiarism   iv.  Data Security
 working on the Internet:     8.   R in IPR stands for:
    i.   Do not send insensible messages.
                         i.  Role                                            ii.  Rights
    ii.   Do not be sensitive while communicating online.
                         iii.  Range                                         iv.  RAM
    iii.  Disclose all personal information.
                     9.   Which of the following can be done to avoid plagiarism?                     [CBSE SQP 2021]
    iv.  Never rely the people you meet online, they may not be disclosing their complete identity.
                         i.  Citing all the resources
    v.   Always respect other people’s privacy.
                         ii.  Properly quoting the content
    vi.  Always share authentic information only.
                         iii.  Using a plagiarism checker before submitting your work
   Ans.    i., iv., v. and vi. should be adopted while working online.
                         iv.  All of these
 Unsolved Exercise       10.  Which of the following techniques can be used for security of data?
                                                                             ii.  Authorisation
                         i.  Authentication

 SECTION A               iii.  Encryption                                    iv.  All of these
 (Objective Type Questions)  B.   Fill in the blanks.

 A.   Multiple choice questions.      1.     Information should not be altered during its transmission over the network. This is known
                         as ............................ .
    1.   Which of the following techniques can be used for data security?   [CBSE SQP 2021]
                     2.    ............................ can be defined as the behaviour or informal guidelines that are followed by the users of the
       i.  Authentication   ii.  Authorization
                         Internet.
       iii.  Encryption   iv.  All of these
                     3.   Insensible messages that are sent in a social group or during a chatting are referred as .............................
    2.   A Firewall is ............................ .     4.    ............................ is the authorisation to use a software.
       i.  Used to protect a computer room from flood and fire     5.   Freedom of information Act, 2002 is replaced by ............................ in the year 2005.
       ii.  A form of virus
                 C.  Assertion and Reasoning questions.
       iii.  A screen saver
                       The following questions consist of two statements – Assertion (A) and Reasoning (R). Answer these
       iv.  None of these  questions by selecting the appropriate option given below:
    3.   Insensible messages that are sent in a social group or during a chat are referred to as ............................ .     i.     Both Assertion (A) and Reason (R) are true and Reason (R) is the correct explanation of Assertion
       i.  Spamming   ii.  Fake messages  (A).
       iii.  Flaming   iv.  Virus     ii.     Both Assertion (A) and Reason (R) are true but Reason (R) is not the correct explanation of Assertion
    4.   Digital property includes ............................ .  (A).

       i.  Emails   ii.  Spreadsheets     iii.  Assertion (A) is true, but Reason (R) is false.
       iii.  Audio files   iv.  All of these     iv.  Assertion (A) is false, but Reason (R) is true.



                                                                                                  Cyber Ethics   207
   204   205   206   207   208   209   210   211   212   213   214