Page 213 - CA_165_V2.0_Flipbook
P. 213

16.   Manish has copied the information the resource available on the internet for his article without acknowledging the
                     original source or taking the permission from the original creator. This unethical termed as:   [CBSE, 2022]
                     (a)  Phishing                                           (b)  Elagrothim
                     (c)  Spying                                             (d)  Identity theft
                 17.  Encryption is one of the most prominent technique used for:                          [CBSE, 2022]

                     (a)  fast data transmission                             (b)  secure data transmission
                     (c)  far away data transmission                         (d)  free data transmission
                 18.  GIMP, Mozilla Firefox, GNU/Linux, Python to come under:                              [CBSE, 2022]
                     (a)  Freeware                                           (b)  FUSS
                     (c)  Shareware                                          (d)  Proprietor

                 19.   The  process  of  converting  the  original  representation  of  the  information  (plaintext),  into  an  alternative  form
                     (ciphertext) is known as:                                                             [CBSE, 2022]

                     (a)  Encryption                                         (b)  Decryption
                     (c)  Phishing                                           (d)  Plagiarism
                 20.  Statement1: FOSS is more user friendly as compared to Proprietary software.
                     Statement 2: Proprietary software allows developers access the globe to participate in the origining development
                     of the software

                     Select the best option from the list given below to understand the corrections of both the statements: [CBSE, 2022]
                     (a)  Both statements are Correction
                     (b)  Statement 1-Correct & Statement 2 Incorrect
                     (c)  Statement 1-Incorrect & Statement 2 Correct
                     (d)  Statement 1-Incorrect & Statement-2 Incorrect

                 21.  Which of the following is Privacy threat to e-commerce?                              [CBSE, 2022]
                     (a)  Password theft                                     (b)  Identity theft
                     (c)  Phishing                                           (d)  All of the above
                 22.   Nowadays we spend more time in the cyber world. Anyone who uses digital technology along with the Internet is a
                     digital citizen or a netizen. Being a good netizen means practicing safe, ethical and legal use of digital technology. A
                     responsible netizen must abide by net etiquettes communication etiquettes and social media etiquettes.
                       We  follow  certain  etiquettes  during  our  social  interactions.  Similarly,  we  need  in  exhibit  proper  manners  and
                     etiquettes while being online. One should be ethical respectful and responsible while surfing the Internet. We should
                     not use copyrighted materials without the permission of the creator or owner. In a group of public ---------, we
                     should respect the diversity of the people in terms of knowledge, experience, culture and other aspects. [CBSE, 2022]
                     Based on the above topic, answer the questions no. i. to v.
                     i.   Identify the net etiquettle which every netizen should following:

                         (a)  One should be responsible                      (b)  One should be ethical
                         (c)  One should be respectful                       (d)  All of these
                     ii.   Being ethical in the cyber world means:
                         (a)  We should share information in the cyber world

                         (b)  We should not use copyrighted materials without permission the creator of owner.
                         (c)  We should further forward the information without checking its reliability at our own end.
                         (d)  All of these

                                                                                                  Cyber Ethics   211
   208   209   210   211   212   213   214   215   216   217   218