Cyber Ethics Class 10 MCQ Questions with Answers
Question 1
Intellectual property is an :
(A) Industrial property
(B) Copyright property
(C) Free property
(D) Both (A) and (B)
Answer:
(D) Both (A) and (B)
Explanation:
Intellectual Property Rights are the rights given to the persons over the creation of their mind. Intellectual property rights reward creativity and human endeavor, which fuel the progress of humankind. The purpose of Intellectual property right is the giving of copyright to the creator of created idea, product, etc.
Question 2.
Trojan Horse is a
(A) Virus
(B) Worm
(C) Spyware
(D) Adware
Answer:
(A) Virus
Explanation:
Trojan horse is a program or file that a user allows or invites onto his or her system, believing that the program or file is normal software, benign, and compliant.
Question 3.
Which of the following is a type of plagiarisim?
(A) Partial
(B) Collusion
(C) Self
(D) All of these
Answer:
(D) All of these
Explanation:
The word plagiarism comes from the Latin word for kidnapping. You know that kidnapping is called as abducting a person. In the same way, lagiarism is called as stealing a person’s ideas and writing. In Plagiarism, you steal author’s ideas, experience, thought, language, etc.
Question 4.
Using someone else’s twitter handle to post something will be termed as :
(A) Fraud
(B) Identity theft
(C) Online stealing
(D) Violation
Answer:
(B) Identity theft
Explanation:
Identity theft is the crime of obtaining the personal or financial information of another person to use their identity to commit fraud, such as making unauthorized transactions or purchases.
Question 5.
E-Commerce means :
(A) Doing business online via the Internet
(B) Doing business off-line
(C) studying commerce via electronic media
(D) None of these
Answer:
(A) Doing business online via the Internet
Explanation:
E-commerce means buying and selling of goods online.
Question 6.
Fraud is :
(A) cheating others
(B) an intentionally false representation of a fact
(C) to deceive another party in order to obtain a profit
(D) All of these
Answer:
(B) an intentionally false representation of a fact
Explanation:
One who is online may open up the possibility for hackers to commit fraud and launch spam and virus attacks.
Question 7.
Intellectual property does not include :
(A) Creation of mind
(B) Artistic work
(C) Literary
(D) None of these
Answer:
(D) None of these
Explanation:
Intellectual property right are the rights for the creations of human intellect including inventions; literary and artistic works; and symbols, names and images etc.
Question 8.
A…………is defined as an exclusive right granted for an invention.
(A) Patent
(B) Copyright
(C) Trademark protection
(D) Design protection
Answer:
(A) Patent
Explanation:
Patent provides protection for novel technical solutions to problems. A patent provides patent owners with protection for their inventions. Patent applications are ‘ published after 18 months. A patent applies for a maximum of 20 years.
Assertion and Reason Based MCQs
Directions: In the following questions, A statement of Assertion (A) is followed by a statement of Reason (R). Mark the correct choice as.
(A) Both A and R are true and R is the correct explanation of A
(B) Both A and R are true but R is Not the correct explanation of A
(C) A is true and R is false
(D) A is false and R is true
Question 1.
Assertion (A): Digital rights are the process of relationship between copyrighted digital works and user permissions and rights related to computers, networks and electronic devices.
Reason (R): Certain digital right/digital rights management (DRM) subcategories are of growing concern such as information/Internet privacy and freedom of information.
Answer:
(B) Both A and R are true but R is Not the correct explanation of A
Explanation:
Digital rights are defined as the process of accessing and controlling of digital information. Digital rights advocacy groups include:
(A) Entertainment Consumers Association (ECA): It is a U.S based non-profit organization that is dedicated to the interests of computer and video game players in the U.S. and Canada.
(B) Free Software Foundation (FSF): It is a Non profit organization and supports the free software movement.
(C) Electronic Frontier Foundation (EFF): It is an International non-profit organization that oversees digital rights advocacy and legal affairs.
(D) Digital Rights Ireland (DRI): It works for civil liberties related to digital rights.
(E) European Digital Rights (EDRi): It is focused on copyright, security, privacy and freedom of expression.
(F) Open Rights Group (ORG): It is focused on controlling issues like censorship, knowledge access, privacy, freedom of information and electronic voting.
Question 2.
Assertion (A): Freedom of information is used to access information of a citizen’s right that is held by the state.
Reason (R): In some countries, this freedom is supported as a constitutional right.
Answer:
(B) Free Software Foundation (FSF): It is a Non profit organization and supports the free software movement.
Explanation:
Freedom of information is defined as the citizen rights to be informed in writing if a governmental agency holds certain information and to request its disclosure. It was recognized for transparency, government accountability, education and general public protection against mismanagement and corruption. More than 70 countries with government representation approved the original freedom of information legislation. Related human rights contain freedom of expression, data protection (privacy), freedom of association and right to development.
Question 3.
Assertion (A): Digital Divide includes the imbalance both in physical access to technology and the resources and skills needed to effectively participate as a digital citizen.
Reason (R): The term global digital divide refers to similarities in access between countries in regards to the Internet and its means of information flow.
Answer:
(C) A is true and R is false
Explanation:
Digital Divide refers to the gap between individuals, households, businesses and geographic areas at different socio-economic levels with regard both to their opportunities to access Information and Communications Technologies (ICT’s) and to their use of the Internet for a wide variety of activities.
Question 4.
Assertion (A): E-commerce security is defined as a set of protocols that safely guide ecommerce transactions.
Reason (R): Security is an important part of any transaction that takes place over the internet.
Answer:
(A) Both A and R are true and R is the correct explanation of A
Explanation:
Most ecommerce merchants leave the mechanics to their hosting company or IT staff, but it helps to understand the basic principles. Any system has to meet four requirements:
- Privacy: Information must be kept from unauthorized parties.
- Integrity: Message must not be altered or tampered with.
- Authentication: Sender and recipient must prove their identities to each other.
- Nonrepudiation: Proof is needed that the message was indeed received.
Question 5.
Assertion (A): Digital signature is an e-signature that is valid through encryption.
Reason (R): Digital signatures does not meet the need for authentication and integrity.
Answer:
(C) A is true and R is false
Explanation:
Digital signature is a process that verify the authenticity of the message (i.e. the message has not been altered by someone.)
Question 6.
Assertion (A): Credit card details can be safely sent with SSL(Secure Socket Layer), but then also it is not save.
Reason (R): Once the details are stored on the server they are vulnerable to outsiders hacking into the server and accompanying network.
Answer:
(A) Both A and R are true and R is the correct explanation of A
Explanation:
SSL uses PKI(Public Key Infrastructure) and digital certificates to ensure privacy and authentication. The procedure is something like this: the client sends a message to the server, which replies with a digital certificate. Using PKI, server and client negotiate to create session keys, which are symmetrical secret keys specially created for that particular transmission. Once the session keys are agreed upon communication continues with these session keys and the digital certificates.\
Case- Based MCQs
Attempt any ? sub-parts from each question. Each sub-part carries 1 mark.
I. Secure Data Transmission Secure data transmission means that data/ information is not being received or modified by an unauthorized person, over a network, from source to destination. For secure data transmission, we can convert an actual message (which is in readable form) into an unreadable message (called an encrypted message) with the help of the concept of encryption. This unreadable message is sent through the network to the destination. If a hacker tries to read this message, he/she receives an unreadable message that cannot be easily converted into the actual message. The unreadable message can be converted to the original message by the receiver at the destination. Caesar Cipher is one of the common encryption techniques. In this technique, each letter of the word is replaced by a letter some fixed number of positions (usually called as key) down the alphabet. For example, if the key is 3, each ‘A’ will be replaced by ‘D’ (Letter ‘D’ is 3 positions down Letter ‘A’ in the alphabet), each ‘B’ will be replaced by ‘E’ and similarly, each ‘Z’ will be replaced by ‘C’. The receiver can identify the original message by using the reverse technique of encryption. This reverse technique is called decryption.
Question 1.
Secure data transmission means :
(A) Data can be accessed by any unauthorized person during transmission.
(B) Data can not be accessed by any unauthorized person during transmission.
(C) Transmission of data
(D) None of the above
Answer:
(B) Data can not be accessed by any unauthorized person during transmission.
Explanation:
The transmitted data cannot be accessed or modified by an unauthenticatcd person.
Question 2.
Which of the following techniques can be used for security of data ?
(A) Authentication
(B) Authorisation
(C) Encryption
(D) All of the Above
Answer:
(D) All of the Above
Explanation:
Authentication: Sender and recipient must prove their identities to each other.
Authorisation: A particular sender/receiver having the authority to send/receive messages. Encryption: Encoding the message in order to send to the receiver.
Question 3.
Caesar Cipher is :
(A) used for conversion of the actual message into an encrypted message
(B) an encryption technique
(C) both (A) and (B)
(D) None of the above
Answer:
(C) both (A) and (B)
Explanation:
The Caesar Cipher technique is one of the earliest and simplest method of encryption technique. It’s simply a type of substitution cipher, i.e., each letter of a given text is replaced by a letter some fixed number of positions down the alphabet. For example with a shift of 1, A would be replaced by B,
B would become C, and so on. The method is apparently named after Julius Caesar, who apparently used it to communicate with his officials.
Question 4.
Person ‘X1 has received an encrypted message and wants to convert this message into the actual message (message before encryption). The technique he should use is called :
(A) Conversion
(B) Encryption
(C) Decryption
(D) None of the above
Answer:
(C) Decryption
Explanation:
Decryption is the technique to decode the encrypted message.
Question 5.
A sender wants to send a message having the text as ‘COMPUTER’ to a receiver using 4 as the key. What will be the encrypted message?
(A) GSQTZXIV
(B) GSQTYXIV
(C) GSXTYXIV
(D) GSQSYXIV
Answer:
(B) GSQTYXIV
Question 6.
An encryption algorithm is used to transform a readable message into:
(A) Text message
(B) Simple message
(C) Converted message
(D) Encrypted message
Answer:
(D) Encrypted message
Explanation:
Encrypted message is the message that is formed by using the encryption technique.
Question 7.
In Ceaser Cipher, for which of the following values of key, the encrypted message will be the same as original message.
(A) 0
(B) 26
(C) both (A) and (B)
(D) None of the above
Answer:
(C) both (A) and (B)
Explanation:
For both 0 and 26 the key will be same for the encrypted message, using the Caesar Cipher technique.
II. Cyber Ethics
Understanding the importance of cyber ethics in daily life has become essential than ever before. Similarly, it is crucial to know how to tackle the situation if you or your kid is being victimized. It is especially hard to talk to teens because they do not want to be lectured about what is right and wrong. They seem to think they have it all sorts out. That is why it is important to instil appropriate cyber etiquette at an early age but if you haven’t there is still time to tell to your child. Cyber ethics concerns to the code of responsible behaviour on the Internet. Just as we are taught to act responsibly in our everyday life. The responsible behaviour on the internet in many ways aligns with all the right behaviour in everyday life, but the results can be significantly different. Some people try to hide behind a false sense of obscurity on the internet, believing that it does not matter if they behave badly online because no one knows who they are or how to search them. That is not all the time true; browsers, computers and internet service providers may keep logs of their activities which can be used to spot illegal or inappropriate behaviour. The Government has taken a positive role in making resources for parents and children to learn about cyber ethics. This is a growing problem and without parents and teachers using the resources available nothing can be done to prepare future generations of internet users from being safe online.
Question 1.
What type of behaviour on the Internet does Cyber Ethics concern?
(A) Active
(B) Responsible
(C) Emotional
(D) Exploratory
Answer:
(B) Responsible
Explanation:
While online, one should follow responsible behaviour. Protecting yourself while online means identifying and taking preventive measures against a number of security and privacy issues.
Question 2.
Who positive role in making resources for parents and children to learn about cyber ethics?
(A) Children
(B) Parents
(C) W3C
(D) Government
Answer:
(D) Government
Explanation:
Government takes preventive measures so that a person while online does not faces any problem.
Question 3.
Some people try to hide behind a sense of obscurity on the internet.
(A) False
(B) True
(C) Either (A) or (B)
(D) None of the above
Answer:
(A) False
Explanation:
Some people try to hide behind a false sense of obscurity on the internet, believing that it does not matter if they behave badly online because no one knows who they are or how to search them. That is not all the time true; browsers, computers and internet service providers may keep logs of their activities which can be used to spot illegal or inappropriate behavior.
Question 4.
Why it is crucial to know how to tackle the situation if your kid is being victimized?
(A) Because they don’t have deep knowledge about it
(B) Because they are afraid to be penalized
(C) Because they do not want to be lectured about what is right and wrong
(D) None of the above
Answer:
(C) Because they do not want to be lectured about what is right and wrong
Explanation:
Parents should guide/guard their children while they are online. Parents should refrain their children to abuse others while online.
Question 5.
Why it is important to instil appropriate cyber etiquette at an early age?
(A) Because of increasing Internet usage worldwide decreases user data privacy
(B) Because of weak firewall and antiviruses protection
(C) Because of people’s insecurities
(D) All of the above
Answer:
(D) All of the above
Explanation:
Cyber etiquettes were recognized for transparency, government accountability, education and general public protection against mismanagement and corruption.
Question 6.
How to prepare future generations of internet users from being safe online?
(A) By instilling appropriate cyber etiquette at an early age
(B) with parents and children using the resources available to learn about cyber ethics
(C) By concerning to the code of responsible behaviour on the Internet
(D) All of the above
Answer:
(D) All of the above
Explanation:
Parents should guide their children to be responsible while using internet. Tell them not to abuse anyone, not to click on any link which can be suspicious.
Question 7.
Why is it important for browsers, computers and internet service providers to keep logs of people’s activities?
(A) So the people can remember what they have searched on the Internet
(B) So the servers can remember who have accessed the stored data
(C) To spot people’s illegal or inappropriate behaviour
(D) None of the above
Answer:
(C) To spot people’s illegal or inappropriate behaviour
Explanation:
It very important to keep track of their users, their activities, their search topic, etc. If any doubt is their about someone’s online behaviour, the ISPs or search engines can inform the authority regarding the same.
III. Plagiarism
Plagiarism is presenting someone else’s work or ideas as your own, with or without their consent, by incorporating it into your work without full acknowledgement. All published and unpublished material, whether in manuscript, printed or electronic form, is covered under this definition. Plagiarism may be intentional or reckless, or unintentional. Under the regulations for examinations, intentional or reckless plagiarism is a disciplinary offence. Considering the pattern, plagiarism can be of different types. They are : Direct Plagiarism, Mosaic Plagiarism, Accidental Plagiarism, Self-Plagiarism and Paraphrasing Plagiarism. Self-plagiarism and mosaic plagiarism are the two most common forms of plagiarism.
Question 1.
………. is presenting someone else’s as your own.
(A) Plagiarism
(B) Hacking
(C) Cracking
(D) All of these
Answer:
(A) Plagiarism
Explanation:
The word plagiarism comes from the Latin word for kidnapping. Plagiarism is called as stealing a person’s ideas and writing. In Plagiarism, you steal author’s ideas, experience, thought, language, etc.
Question 2.
Which types of work are covered in plagiarism?
(A) Published
(B) Unpublished
(C) Manuscript
(D) All of these
Answer:
(D) All of these
Explanation:
Plagiarism occurs when you use other’s words, ideas, data, or figures and do not acknowledge that you have done so. If you use the words, ideas, or phrasing of another person or from published material, ‘ you must
- Use quotation marks around the words and cite the source, or
- Paraphrase or summarize acceptably and Cite the source.
Question 3.
Plagiarism may be………..
(A) Intentional
(B) Reckless
(C) Noncontractile
(D) Any of these
Answer:
(D) Any of these
Explanation:
Plagiarism can be intentional, reckness and uncontractile. Plagiarism may have become a habit of students due to online learning.
Question 4.
Which of the following is/are most common form(s) of plagiarism?
(A) Self plagiarism
(B) Mosaic plagiarism
(C) Both (A) and (B)
(D) None of these
Answer:
(C) Both (A) and (B)
Explanation:
Self-plagiarism: It is commonly described as recycling or reusing one’s own specific words from previously published texts. Mosaic plagiarism: It is a combination of both direct and paraphrase plagiarism. It involves incorporating various words, phrases, and sentences into your essay without providing quotation marks or attributions.
Question 5.
Plagiarism is a/an offence.
(A) Criminal
(B) Technology
(C) Technical
(D) Disciplinary
Answer:
(D) Disciplinary
Explanation:
Plagiarism is the practice of using someone else’s work and pretending that it is your own. In other words, plagiarism is an act of fraud.
It involves both stealing someone else’s work and lying about it afterward. It is a disciplinary action not a crime.
Question 6.
Which of the following is not a type of plagiarism?
(A) Direct plagiarism
(B) Mosaic plagiarism
(C) Accidental plagiarism
(D) Indirect plagiarism
Answer:
(D) Indirect plagiarism
Explanation:
Direct Plagiarism: It is the act of copying other person’s work word to word without changing a single word. Paraphrase plagiarism: It involves making a few changes to someone else’s work, then passing it off as your own. Accidental plagiarism: It occurs when citations are missing or sources are cited incorrectly.
Question 7.
What factor could be included for plagiarism?
(A) Having knowledge
(B) Competition
(C) Hard working
(D) Management skills
Answer:
(B) Competition
Explanation:
To avoid plagiarism, you should follow some rules:
- Instead of copying the language of the book as it is, try to put it in your own language/ words.
- One should have a clear understanding of Plagiarism.
- If copying someone else’s work is your task, word to word, then do not forget enclosing it in quotes and also mention its source.
- If you are not sure that you are documenting your sources correctly (whether by using parenthetical references or a fully formatted bibliography), ask your instructor.