KnowledgeBoat Logo
OPEN IN APP

Chapter 7

Cyberethics

Class 10 - Kips Cyber Beans CBSE Computer Code 165



Multiple Choice Questions

Question 1

Which of the following is not a form of software piracy?

  1. Softlifting
  2. Counterfeiting
  3. Hard Disk Loading
  4. Encrypting

Answer

Encrypting

Reason — Encryption is the process of transforming data into an unreadable code. It is not a form of software piracy. Softlifting, counterfeiting and hard disk loading are forms of software piracy.

Question 2

............... is the process of transforming data into an unreadable code.

  1. Copyright
  2. Trademark
  3. Encryption
  4. Information Security

Answer

Encryption

Reason — Encryption is the process of transforming data into an unreadable code.

Question 3

............... refers to flooding the user's inbox with unwanted advertisements and messages.

  1. Spamming
  2. Virus
  3. Hacking
  4. Patent

Answer

Spamming

Reason — Spamming refers to flooding the user's inbox with unwanted advertisements and messages.

Question 4

The right which is concerned with the design and algorithm of the product rather than the entire product is called ............... .

  1. Copyright
  2. Patent
  3. Trademark
  4. Data Protection Law

Answer

Patent

Reason — The right which is concerned with the design and algorithm of the product rather than the entire product is called Patent.

Question 5

E-commerce stands for ............... .

  1. Electrical Commerce
  2. Electronic commerce
  3. Ethical Commerce
  4. None of these

Answer

Electronic commerce

Reason — E-commerce stands for Electronic commerce.

Question 6

When someone else uses your online identity to create fraudulent messages or commit crimes, it is known as ............... .

  1. Identity theft
  2. Cyber theft
  3. E-commerce fraud
  4. Piracy

Answer

Identity theft

Reason — When someone else uses your online identity to create fraudulent messages or commit crimes, it is known as identity theft.

Question 7

............... is defined as the right to control what happens with your personal information.

  1. Pretexting
  2. Privacy
  3. Piracy
  4. Patent

Answer

Privacy

Reason — Privacy is defined as the right to control what happens with your personal information.

Question 8

............... licences are a family of permissive free software licences.

  1. MIT
  2. Apache
  3. GNU
  4. BSD

Answer

BSD

Reason — BSD (Berkeley Software Distribution) licences are a family of permissive free software licences.

Question 9

............... software is a copyrighted software.

  1. Private
  2. Proprietary
  3. Privacy
  4. Protective

Answer

Proprietary

Reason — Proprietary software is a copyrighted software.

Question 10

............... Rights refer to intellectual property rights given to persons over the digital property created by them.

  1. Cyber
  2. Privacy
  3. Legal
  4. Digital Property

Answer

Digital Property

Reason — Digital Property Rights refer to intellectual property rights given to persons over the digital property created by them.

Fill in the Blanks

Question 1

............... is a system of moral principles that differentiates between good and bad practices.

Answer

Ethics is a system of moral principles that differentiates between good and bad practices.

Question 2

............... to practice ethical code of conduct constitutes fraud.

Answer

Failure to practice ethical code of conduct constitutes fraud.

Question 3

............... is a technique used to retrieve personal information of a user from his discarded documents.

Answer

DumpsterDiving is a technique used to retrieve personal information of a user from his discarded documents.

Question 4

............... is stealing confidential, personal, and financial information from a computer or a mobile phone and misusing it to harm the user.

Answer

Cyber theft is stealing confidential, personal, and financial information from a computer or a mobile phone and misusing it to harm the user.

Question 5

............... is obtaining personal information through direct observation by looking over a person's shoulder.

Answer

Shoulder Surfing is obtaining personal information through direct observation by looking over a person's shoulder.

Question 6

HTTPS Protocol encrypts the information or data using a ............... certificate.

Answer

HTTPS Protocol encrypts the information or data using a Transport Layer Security (TLS) certificate.

Question 7

............... software are computer programs which identify, prevent, and remove viruses from our computer.

Answer

Antivirus software are computer programs which identify, prevent, and remove viruses from our computer.

Question 8

Encrypted data is referred to as ............... text.

Answer

Encrypted data is referred to as Cipher text.

Question 9

When the same sentence structure is used with synonyms for the appropriate words of the sentence, it is called ............... plagiarism.

Answer

When the same sentence structure is used with synonyms for the appropriate words of the sentence, it is called Mosaic plagiarism.

Question 10

The simplest way to prevent plagiarism is the ............... method.

Answer

The simplest way to prevent plagiarism is the Citation method.

State True or False

Question 1

Plagiarism may occur due to a lack of interest in one's work.

Answer

True

Reason — Lack of interest in one's work is a factor contributing to plagiarism.

Question 2

Piracy is concerned with personal information.

Answer

False

Reason — Software Piracy refers to theft of software through illegal copying of genuine programs or counterfeiting and circulation of products which are duplicate copies of the original.

Question 3

Patent for innovations is an Industrial property.

Answer

True

Reason — Industrial Property includes trademarks, patents for innovations, industrial design rights, and geographical indications (GI) of source.

Question 4

We should never share our password and PIN number with unauthorised personnels.

Answer

True

Reason — We should never share our password and PIN number with unauthorised personnels as it may lead to crimes like identity theft.

Question 5

Encryption is the process of transforming data into a readable code.

Answer

False

Reason — Encryption is the process of transforming data into an unreadable code.

Question 6

The Internet offers us convenient ways to shop from our homes or offices for almost everything.

Answer

True

Reason — The Internet offers us online stores and websites to shop from our homes or offices for almost everything.

Question 7

Good ethics means that the company provides the most reliable information about products or services.

Answer

True

Reason — Good ethics in business involve being honest, transparent, and providing reliable and accurate information to customers about products or services. This prioritizes integrity, trustworthiness, and customer well-being.

Question 8

Doing business legally and ethically only benefits the customers and not the company.

Answer

False

Reason — Legal and ethical business practices create a win-win situation where both customers and the company benefit from a positive and sustainable business environment.

Question 9

Renting means unauthorised sharing of software for temporary use for some nominal charges.

Answer

True

Reason — Renting means unauthorised sharing of software for temporary use for some nominal charges.

Question 10

Apache licence version 2.0 is an open source software licence.

Answer

True

Reason — Apache licence version 2.0 is an open source software licence.

Answer in One word or a Sentence

Question 1

Successful security solutions require a convergence of three components. Name these components.

Answer

The components are:

  1. Technology
  2. People
  3. Processes

Question 2

What are the most common forms of identification and authentication.

Answer

Identification → Username
Authentication → Password

Question 3

Name the process of transforming data into an unreadable code.

Answer

Encryption

Question 4

Name the term for any digital information related to you or created by you, which may be stored online?

Answer

Digital property

Question 5

Which type of licences offer users the right to run, study, share, modify, and distribute copies and modified versions of the software with the condition that the same rights be preserved for its derivatives?

Answer

Copyleft licences

Question 6

What is the other name for literary theft?

Answer

Plagiarism

Question 7

Name the term used for the right to seek, receive, and impart information and ideas, through any media.

Answer

Freedom of expression

Question 8

Which type of software has no ownership or copyright associated with it?

Answer

Public-domain software

Question 9

Give the full form of BSD licences.

Answer

Berkeley Software Distribution

Question 10

When the user does not really understand how to properly paraphrase, quote, and cite the research, which type of plagiarism is he committing?

Answer

Accidental Plagiarism

Theoretical Questions

Question 1

What is fraud? Cite any two reasons why online fraud has been increasing.

Answer

Failure to practice ethical code of conduct constitutes fraud. Fraud means purposefully misrepresenting facts to deceive another person for personal gains.

Online fraud has been increasing because of the following two reasons:

  1. Ambiguity — Since the transaction does not happen face-to-face, the identity of the parties is easily concealed and is hard to verify.
  2. Hacking — It is relatively easy for hackers to steal information and fraudsters to buy that information in the online black market.

Question 2

Enlist any three netiquettes to be followed when online.

Answer

Three netiquettes to be followed when we are online are as follows:

  1. When communicating online, we should always begin our message with a salutation and end it with our name or signature.
  2. We should not read or forward another person's mail without seeking his permission.
  3. We should treat others as we would like to be treated by others. We should not include sarcastic or insulting comments in our message and always respect other's views and be courteous while posting our opinions on the online discussion groups.

Question 3

Define Plagiarism. Write any three steps to prevent plagiarism.

Answer

Plagiarism means using or imitating the language and thoughts of some other person and projecting that representation as to our original work.

Three steps to prevent plagiarism are:

  1. One must specify the source, which informs the reader about the basis of one's ideas and the extent of one's research.
  2. To avoid plagiarism, one should refer to several sources, understand the concept, and then pen down one's understanding of the topic.
  3. One should use quotation marks around all the quoted words to avoid plagiarism.

Question 4

Define Identity theft.

Answer

Identity theft refers to an act of stealing someone's personal information such as name, login details etc. and then posing as that person online. Malicious activities like fraudulent posts, rumour mongering, riots fueling, fraudulent financial transactions, etc. can be carried out through identity theft.

Question 5

What is the difference between an Open Source and Free software?

Answer

Differences between Open Source software and Free software:

S.
No.
Open Source SoftwareFree Software
1.Open source software refers to software whose source code is made available to the public, allowing anyone to view, use, modify, and distribute the code.Free software refers to software that respects users' freedoms.
2.Open source emphasizes the practical benefits of transparency, collaboration, and the ability to modify and distribute software freely.Free software emphasizes the philosophical and ethical aspects of software freedom focusing on users' rights to control and modify the software they use.
3.Open source software can be released under various licenses, some of which are more permissive like BSD, MIT, Apache 2.Free software adheres to specific licenses like the GNU General Public License (GPL) that ensures users' freedoms.

Question 6

Explain the philosophy of Open Source. Enlist any four criteria that qualifies a program to be Open source software.

Answer

Open source is a philosophy that promotes the free access and distribution of an end product, usually software or a program. It may extend to the implementation and design of other products. Such software, generally, gives users the freedom to run the software for any purpose, to use and modify the software, and to redistribute copies of the original and modified versions to others. These permissions are enforced through an open source licence.

Four criteria that qualify a program to be Open source software are:

  1. Free Redistribution — There shall be no restriction on the sale or distribution of the software, partial or whole, and such a sale shall be free of any royalty charges or any other fee.
  2. Source Code — The distributed program must include the source code as well as its compiled form. In cases where it is not included, the source code must be easily accessible from public sources on the Internet.
  3. Derived Works — The licence must allow modifications and derived works. It must allow them to be distributed under the same terms as the licence of the original software.
  4. No Discrimination against Persons or Groups — The licence must not discriminate against any person or group of persons.

Question 7

What do you mean by Digital Property Rights?

Answer

Digital Property Rights refer to intellectual property rights given to persons over the digital property created by them. They usually give the creator an exclusive right over the use of his/her creation for a specific period.

Question 8

Mention any three ways to bridge the digital divide.

Answer

Three ways to bridge the digital divide are:

  1. The government should conduct awareness camps and classes for the elderly to address their hesitation of using information technology.
  2. All the government institutes must be encouraged to propose various computer courses at nominal fees.
  3. The government should provide Internet access to the remotest parts of the country.

Question 9

What is Proprietary software? Mention three features of proprietary software.

Answer

Proprietary software is a copyrighted software. This software may not be freely used, modified, distributed, and is restricted by conditions predefined by its publisher, vendor, or developer.

Three features of Proprietary Software are:

  1. It is primarily a commercial software.
  2. It does not provide its source code.
  3. It can be purchased or licenced for a fee.

Question 10

What do you mean by copyleft licences?

Answer

Copyleft licences offer users the right to run, study, share, modify, and distribute copies and modified versions of the software with the condition that the same rights be preserved for its derivatives. Copyleft licences require that the source code must be made available to the recipients. For example, GNU General Public License (GNU GPL), Eclipse Public Licence (EPL), Common Development and Distribution Licence (CDDL) etc.

Application Based Questions

Question 1

Asmita belongs to an affluent family, and she wants to do something to bridge the digital divide in her community. What can she do at an individual level to bring this change?

Answer

Asmita can take the following steps at an individual level to bridge the digital divide in her community:

  1. She can provide unused or older digital devices like smartphones or laptops to those who can't afford them.
  2. She can collaborate with local ISPs or organizations to sponsor affordable or free internet access for underserved areas.
  3. She can organize workshops to teach digital skills, such as basic computer literacy and internet usage, to community members.
  4. She can enhance local libraries with computers and internet connectivity for public use.
  5. She can fund scholarships or educational programs that focus on digital literacy and technology training.

Question 2

Abhay is going to make his first Online purchase. How should his parents guide to make him aware of the common e-commerce frauds? List the steps to prevent him from becoming a victim.

Answer

Abhay's parents should make him aware of the common e-commerce frauds by educating him about the various kinds of e-commerce frauds which are as follows:

  1. Misleading Product Listing
  2. Selling Counterfeit Products
  3. Unfriendly Return Policy
  4. Fraudulent Payment

Abhay can take the following steps to prevent him from becoming a victim of e-commerce fraud:

  1. Always use secured Internet connection and not a public Wi-Fi while purchasing something.
  2. Keep one's antivirus software up-to-date.
  3. Ensure the e-commerce website uses encryption protocol certificates like TLS and SSL. Check that the lock icon is present in the address bar, and the URL has an 'https', before entering payment details into any website.
  4. Never give personal and credit cards details over the phone.
  5. Read the Website's Refund Policy carefully.
  6. Look for grammatical errors because phishing websites often have grammatical errors in their text.
PrevNext