{"id":37022,"date":"2022-01-27T11:05:03","date_gmt":"2022-01-27T05:35:03","guid":{"rendered":"https:\/\/mcq-questions.com\/?p=37022"},"modified":"2022-02-25T09:35:07","modified_gmt":"2022-02-25T04:05:07","slug":"mcq-questions-for-class-10-computer-applications-chapter-8","status":"publish","type":"post","link":"https:\/\/mcq-questions.com\/mcq-questions-for-class-10-computer-applications-chapter-8\/","title":{"rendered":"MCQ Questions for Class 10 Computer Applications Chapter 8 Cyber Ethics"},"content":{"rendered":"
Question 1<\/p>\n
(A) Industrial property
\n(B) Copyright property
\n(C) Free property
\n(D) Both (A) and (B)
\nAnswer:
\n(D) Both (A) and (B)<\/p>\n
Explanation:
\nIntellectual Property Rights are the rights given to the persons over the creation of their mind. Intellectual property rights reward creativity and human endeavor, which fuel the progress of humankind. The purpose of Intellectual property right is the giving of copyright to the creator of created idea, product, etc.<\/p>\n
<\/p>\n
Question 2.<\/p>\n
(A) Virus
\n(B) Worm
\n(C) Spyware
\n(D) Adware
\nAnswer:
\n(A) Virus<\/p>\n
Explanation:
\nTrojan horse is a program or file that a user allows or invites onto his or her system, believing that the program or file is normal software, benign, and compliant.<\/p>\n
Question 3.<\/p>\n
(A) Partial
\n(B) Collusion
\n(C) Self
\n(D) All of these
\nAnswer:
\n(D) All of these<\/p>\n
Explanation:
\nThe word plagiarism comes from the Latin word for kidnapping. You know that kidnapping is called as abducting a person. In the same way, lagiarism is called as stealing a person’s ideas and writing. In Plagiarism, you steal author’s ideas, experience, thought, language, etc.<\/p>\n
Question 4.<\/p>\n
(A) Fraud
\n(B) Identity theft
\n(C) Online stealing
\n(D) Violation
\nAnswer:
\n(B) Identity theft<\/p>\n
Explanation:
\nIdentity theft is the crime of obtaining the personal or financial information of another person to use their identity to commit fraud, such as making unauthorized transactions or purchases.<\/p>\n
Question 5.<\/p>\n
(A) Doing business online via the Internet
\n(B) Doing business off-line
\n(C) studying commerce via electronic media
\n(D) None of these
\nAnswer:
\n(A) Doing business online via the Internet<\/p>\n
Explanation:
\nE-commerce means buying and selling of goods online.<\/p>\n
<\/p>\n
Question 6.<\/p>\n
(A) cheating others
\n(B) an intentionally false representation of a fact
\n(C) to deceive another party in order to obtain a profit
\n(D) All of these
\nAnswer:
\n(B) an intentionally false representation of a fact<\/p>\n
Explanation:
\nOne who is online may open up the possibility for hackers to commit fraud and launch spam and virus attacks.<\/p>\n
Question 7.<\/p>\n
(A) Creation of mind
\n(B) Artistic work
\n(C) Literary
\n(D) None of these
\nAnswer:
\n(D) None of these<\/p>\n
Explanation:
\nIntellectual property right are the rights for the creations of human intellect including inventions; literary and artistic works; and symbols, names and images etc.<\/p>\n
Question 8.<\/p>\n
(A) Patent
\n(B) Copyright
\n(C) Trademark protection
\n(D) Design protection
\nAnswer:
\n(A) Patent<\/p>\n
Explanation:
\nPatent provides protection for novel technical solutions to problems. A patent provides patent owners with protection for their inventions. Patent applications are ‘ published after 18 months. A patent applies for a maximum of 20 years.<\/p>\n
Assertion and Reason Based MCQs<\/span><\/p>\n Directions: In the following questions, A statement of Assertion (A) is followed by a statement of Reason (R). Mark the correct choice as. Question 1.<\/p>\n Answer: Explanation: (F) Open Rights Group (ORG): It is focused on controlling issues like censorship, knowledge access, privacy, freedom of information and electronic voting.<\/p>\n <\/p>\n Question 2.<\/p>\n Answer: Explanation: Question 3.<\/p>\n Answer: Explanation: Question 4.<\/p>\n Answer: Explanation: Question 5.<\/p>\n Answer: Explanation: Question 6.<\/p>\n Answer: Explanation: Case- Based MCQs<\/span><\/p>\n Attempt any ? sub-parts from each question. Each sub-part carries 1 mark. Question 1.<\/p>\n (A) Data can be accessed by any unauthorized person during transmission. Explanation: Question 2.<\/p>\n (A) Authentication Explanation: <\/p>\n Question 3.<\/p>\n (A) used for conversion of the actual message into an encrypted message Explanation: Question 4.<\/p>\n (A) Conversion Explanation: Question 5.<\/p>\n (A) GSQTZXIV Question 6.<\/p>\n (A) Text message Explanation: Question 7.<\/p>\n (A) 0 Explanation: II. Cyber Ethics Question 1.<\/p>\n (A) Active Explanation: Question 2.<\/p>\n (A) Children Explanation: <\/p>\n Question 3.<\/p>\n (A) False Explanation: Question 4.<\/p>\n (A) Because they don’t have deep knowledge about it Explanation: Question 5.<\/p>\n (A) Because of increasing Internet usage worldwide decreases user data privacy Explanation: Question 6.<\/p>\n (A) By instilling appropriate cyber etiquette at an early age Explanation: Question 7.<\/p>\n (A) So the people can remember what they have searched on the Internet Explanation: III. Plagiarism Question 1.<\/p>\n (A) Plagiarism Explanation: Question 2.<\/p>\n (A) Published Explanation: Question 3.<\/p>\n (A) Intentional Explanation: <\/p>\n Question 4.<\/p>\n (A) Self plagiarism Explanation: Question 5.<\/p>\n (A) Criminal Explanation: Question 6.<\/p>\n (A) Direct plagiarism Explanation: Question 7.<\/p>\n (A) Having knowledge Explanation: Cyber Ethics Class 10 MCQ Questions with Answers Question 1 Intellectual property is an : (A) Industrial property (B) Copyright property (C) Free property (D) Both (A) and (B) Answer: (D) Both (A) and (B) Explanation: Intellectual Property Rights are the rights given to the persons over the creation of their mind. Intellectual property rights …<\/p>\n
\n(A) Both A and R are true and R is the correct explanation of A
\n(B) Both A and R are true but R is Not the correct explanation of A
\n(C) A is true and R is false
\n(D) A is false and R is true<\/p>\nAssertion (A): Digital rights are the process of relationship between copyrighted digital works and user permissions and rights related to computers, networks and electronic devices.
\nReason (R): Certain digital right\/digital rights management (DRM) subcategories are of growing concern such as information\/Internet privacy and freedom of information.<\/h2>\n
\n(B) Both A and R are true but R is Not the correct explanation of A<\/p>\n
\nDigital rights are defined as the process of accessing and controlling of digital information. Digital rights advocacy groups include:
\n(A) Entertainment Consumers Association (ECA): It is a U.S based non-profit organization that is dedicated to the interests of computer and video game players in the U.S. and Canada.
\n(B) Free Software Foundation (FSF): It is a Non profit organization and supports the free software movement.
\n(C) Electronic Frontier Foundation (EFF): It is an International non-profit organization that oversees digital rights advocacy and legal affairs.
\n(D) Digital Rights Ireland (DRI): It works for civil liberties related to digital rights.
\n(E) European Digital Rights (EDRi): It is focused on copyright, security, privacy and freedom of expression.<\/p>\nAssertion (A): Freedom of information is used to access information of a citizen’s right that is held by the state.
\nReason (R): In some countries, this freedom is supported as a constitutional right.<\/h2>\n
\n(B) Free Software Foundation (FSF): It is a Non profit organization and supports the free software movement.<\/p>\n
\nFreedom of information is defined as the citizen rights to be informed in writing if a governmental agency holds certain information and to request its disclosure. It was recognized for transparency, government accountability, education and general public protection against mismanagement and corruption. More than 70 countries with government representation approved the original freedom of information legislation. Related human rights contain freedom of expression, data protection (privacy), freedom of association and right to development.<\/p>\nAssertion (A): Digital Divide includes the imbalance both in physical access to technology and the resources and skills needed to effectively participate as a digital citizen.
\nReason (R): The term global digital divide refers to similarities in access between countries in regards to the Internet and its means of information flow.<\/h2>\n
\n(C) A is true and R is false<\/p>\n
\nDigital Divide refers to the gap between individuals, households, businesses and geographic areas at different socio-economic levels with regard both to their opportunities to access Information and Communications Technologies (ICT’s) and to their use of the Internet for a wide variety of activities.<\/p>\nAssertion (A): E-commerce security is defined as a set of protocols that safely guide ecommerce transactions.
\nReason (R): Security is an important part of any transaction that takes place over the internet.<\/h2>\n
\n(A) Both A and R are true and R is the correct explanation of A<\/p>\n
\nMost ecommerce merchants leave the mechanics to their hosting company or IT staff, but it helps to understand the basic principles. Any system has to meet four requirements:<\/p>\n\n
Assertion (A): Digital signature is an e-signature that is valid through encryption.
\nReason (R): Digital signatures does not meet the need for authentication and integrity.<\/h2>\n
\n(C) A is true and R is false<\/p>\n
\nDigital signature is a process that verify the authenticity of the message (i.e. the message has not been altered by someone.)<\/p>\nAssertion (A): Credit card details can be safely sent with SSL(Secure Socket Layer), but then also it is not save.
\nReason (R): Once the details are stored on the server they are vulnerable to outsiders hacking into the server and accompanying network.<\/h2>\n
\n(A) Both A and R are true and R is the correct explanation of A<\/p>\n
\nSSL uses PKI(Public Key Infrastructure) and digital certificates to ensure privacy and authentication. The procedure is something like this: the client sends a message to the server, which replies with a digital certificate. Using PKI, server and client negotiate to create session keys, which are symmetrical secret keys specially created for that particular transmission. Once the session keys are agreed upon communication continues with these session keys and the digital certificates.\\<\/p>\n
\nI. Secure Data Transmission Secure data transmission means that data\/ information is not being received or modified by an unauthorized person, over a network, from source to destination. For secure data transmission, we can convert an actual message (which is in readable form) into an unreadable message (called an encrypted message) with the help of the concept of encryption. This unreadable message is sent through the network to the destination. If a hacker tries to read this message, he\/she receives an unreadable message that cannot be easily converted into the actual message. The unreadable message can be converted to the original message by the receiver at the destination. Caesar Cipher is one of the common encryption techniques. In this technique, each letter of the word is replaced by a letter some fixed number of positions (usually called as key) down the alphabet. For example, if the key is 3, each ‘A’ will be replaced by ‘D’ (Letter ‘D’ is 3 positions down Letter ‘A’ in the alphabet), each ‘B’ will be replaced by ‘E’ and similarly, each ‘Z’ will be replaced by ‘C’. The receiver can identify the original message by using the reverse technique of encryption. This reverse technique is called decryption.<\/p>\nSecure data transmission means :<\/h2>\n
\n(B) Data can not be accessed by any unauthorized person during transmission.
\n(C) Transmission of data
\n(D) None of the above
\nAnswer:
\n(B) Data can not be accessed by any unauthorized person during transmission.<\/p>\n
\nThe transmitted data cannot be accessed or modified by an unauthenticatcd person.<\/p>\nWhich of the following techniques can be used for security of data ?<\/h2>\n
\n(B) Authorisation
\n(C) Encryption
\n(D) All of the Above
\nAnswer:
\n(D) All of the Above<\/p>\n
\nAuthentication: Sender and recipient must prove their identities to each other.
\nAuthorisation: A particular sender\/receiver having the authority to send\/receive messages. Encryption: Encoding the message in order to send to the receiver.<\/p>\nCaesar Cipher is :<\/h2>\n
\n(B) an encryption technique
\n(C) both (A) and (B)
\n(D) None of the above
\nAnswer:
\n(C) both (A) and (B)<\/p>\n
\nThe Caesar Cipher technique is one of the earliest and simplest method of encryption technique. It’s simply a type of substitution cipher, i.e., each letter of a given text is replaced by a letter some fixed number of positions down the alphabet. For example with a shift of 1, A would be replaced by B,
\nB would become C, and so on. The method is apparently named after Julius Caesar, who apparently used it to communicate with his officials.<\/p>\nPerson ‘X1 has received an encrypted message and wants to convert this message into the actual message (message before encryption). The technique he should use is called :<\/h2>\n
\n(B) Encryption
\n(C) Decryption
\n(D) None of the above
\nAnswer:
\n(C) Decryption<\/p>\n
\nDecryption is the technique to decode the encrypted message.<\/p>\nA sender wants to send a message having the text as ‘COMPUTER’ to a receiver using 4 as the key. What will be the encrypted message?<\/h2>\n
\n(B) GSQTYXIV
\n(C) GSXTYXIV
\n(D) GSQSYXIV
\nAnswer:
\n(B) GSQTYXIV<\/p>\nAn encryption algorithm is used to transform a readable message into:<\/h2>\n
\n(B) Simple message
\n(C) Converted message
\n(D) Encrypted message
\nAnswer:
\n(D) Encrypted message<\/p>\n
\nEncrypted message is the message that is formed by using the encryption technique.<\/p>\nIn Ceaser Cipher, for which of the following values of key, the encrypted message will be the same as original message.<\/h2>\n
\n(B) 26
\n(C) both (A) and (B)
\n(D) None of the above
\nAnswer:
\n(C) both (A) and (B)<\/p>\n
\nFor both 0 and 26 the key will be same for the encrypted message, using the Caesar Cipher technique.<\/p>\n
\nUnderstanding the importance of cyber ethics in daily life has become essential than ever before. Similarly, it is crucial to know how to tackle the situation if you or your kid is being victimized. It is especially hard to talk to teens because they do not want to be lectured about what is right and wrong. They seem to think they have it all sorts out. That is why it is important to instil appropriate cyber etiquette at an early age but if you haven’t there is still time to tell to your child. Cyber ethics concerns to the code of responsible behaviour on the Internet. Just as we are taught to act responsibly in our everyday life. The responsible behaviour on the internet in many ways aligns with all the right behaviour in everyday life, but the results can be significantly different. Some people try to hide behind a false sense of obscurity on the internet, believing that it does not matter if they behave badly online because no one knows who they are or how to search them. That is not all the time true; browsers, computers and internet service providers may keep logs of their activities which can be used to spot illegal or inappropriate behaviour. The Government has taken a positive role in making resources for parents and children to learn about cyber ethics. This is a growing problem and without parents and teachers using the resources available nothing can be done to prepare future generations of internet users from being safe online.<\/p>\nWhat type of behaviour on the Internet does Cyber Ethics concern?<\/h2>\n
\n(B) Responsible
\n(C) Emotional
\n(D) Exploratory
\nAnswer:
\n(B) Responsible<\/p>\n
\nWhile online, one should follow responsible behaviour. Protecting yourself while online means identifying and taking preventive measures against a number of security and privacy issues.<\/p>\nWho positive role in making resources for parents and children to learn about cyber ethics?<\/h2>\n
\n(B) Parents
\n(C) W3C
\n(D) Government
\nAnswer:
\n(D) Government<\/p>\n
\nGovernment takes preventive measures so that a person while online does not faces any problem.<\/p>\nSome people try to hide behind a sense of obscurity on the internet.<\/h2>\n
\n(B) True
\n(C) Either (A) or (B)
\n(D) None of the above
\nAnswer:
\n(A) False<\/p>\n
\nSome people try to hide behind a false sense of obscurity on the internet, believing that it does not matter if they behave badly online because no one knows who they are or how to search them. That is not all the time true; browsers, computers and internet service providers may keep logs of their activities which can be used to spot illegal or inappropriate behavior.<\/p>\nWhy it is crucial to know how to tackle the situation if your kid is being victimized?<\/h2>\n
\n(B) Because they are afraid to be penalized
\n(C) Because they do not want to be lectured about what is right and wrong
\n(D) None of the above
\nAnswer:
\n(C) Because they do not want to be lectured about what is right and wrong<\/p>\n
\nParents should guide\/guard their children while they are online. Parents should refrain their children to abuse others while online.<\/p>\nWhy it is important to instil appropriate cyber etiquette at an early age?<\/h2>\n
\n(B) Because of weak firewall and antiviruses protection
\n(C) Because of people’s insecurities
\n(D) All of the above
\nAnswer:
\n(D) All of the above<\/p>\n
\nCyber etiquettes were recognized for transparency, government accountability, education and general public protection against mismanagement and corruption.<\/p>\nHow to prepare future generations of internet users from being safe online?<\/h2>\n
\n(B) with parents and children using the resources available to learn about cyber ethics
\n(C) By concerning to the code of responsible behaviour on the Internet
\n(D) All of the above
\nAnswer:
\n(D) All of the above<\/p>\n
\nParents should guide their children to be responsible while using internet. Tell them not to abuse anyone, not to click on any link which can be suspicious.<\/p>\nWhy is it important for browsers, computers and internet service providers to keep logs of people’s activities?<\/h2>\n
\n(B) So the servers can remember who have accessed the stored data
\n(C) To spot people’s illegal or inappropriate behaviour
\n(D) None of the above
\nAnswer:
\n(C) To spot people’s illegal or inappropriate behaviour<\/p>\n
\nIt very important to keep track of their users, their activities, their search topic, etc. If any doubt is their about someone’s online behaviour, the ISPs or search engines can inform the authority regarding the same.<\/p>\n
\nPlagiarism is presenting someone else’s work or ideas as your own, with or without their consent, by incorporating it into your work without full acknowledgement. All published and unpublished material, whether in manuscript, printed or electronic form, is covered under this definition. Plagiarism may be intentional or reckless, or unintentional. Under the regulations for examinations, intentional or reckless plagiarism is a disciplinary offence. Considering the pattern, plagiarism can be of different types. They are : Direct Plagiarism, Mosaic Plagiarism, Accidental Plagiarism, Self-Plagiarism and Paraphrasing Plagiarism. Self-plagiarism and mosaic plagiarism are the two most common forms of plagiarism.<\/p>\n………. is presenting someone else’s as your own.<\/h2>\n
\n(B) Hacking
\n(C) Cracking
\n(D) All of these
\nAnswer:
\n(A) Plagiarism<\/p>\n
\nThe word plagiarism comes from the Latin word for kidnapping. Plagiarism is called as stealing a person’s ideas and writing. In Plagiarism, you steal author’s ideas, experience, thought, language, etc.<\/p>\nWhich types of work are covered in plagiarism?<\/h2>\n
\n(B) Unpublished
\n(C) Manuscript
\n(D) All of these
\nAnswer:
\n(D) All of these<\/p>\n
\nPlagiarism occurs when you use other’s words, ideas, data, or figures and do not acknowledge that you have done so. If you use the words, ideas, or phrasing of another person or from published material, ‘ you must<\/p>\n\n
Plagiarism may be………..<\/h2>\n
\n(B) Reckless
\n(C) Noncontractile
\n(D) Any of these
\nAnswer:
\n(D) Any of these<\/p>\n
\nPlagiarism can be intentional, reckness and uncontractile. Plagiarism may have become a habit of students due to online learning.<\/p>\nWhich of the following is\/are most common form(s) of plagiarism?<\/h2>\n
\n(B) Mosaic plagiarism
\n(C) Both (A) and (B)
\n(D) None of these
\nAnswer:
\n(C) Both (A) and (B)<\/p>\n
\nSelf-plagiarism: It is commonly described as recycling or reusing one’s own specific words from previously published texts. Mosaic plagiarism: It is a combination of both direct and paraphrase plagiarism. It involves incorporating various words, phrases, and sentences into your essay without providing quotation marks or attributions.<\/p>\nPlagiarism is a\/an offence.<\/h2>\n
\n(B) Technology
\n(C) Technical
\n(D) Disciplinary
\nAnswer:
\n(D) Disciplinary<\/p>\n
\nPlagiarism is the practice of using someone else’s work and pretending that it is your own. In other words, plagiarism is an act of fraud.
\nIt involves both stealing someone else’s work and lying about it afterward. It is a disciplinary action not a crime.<\/p>\nWhich of the following is not a type of plagiarism?<\/h2>\n
\n(B) Mosaic plagiarism
\n(C) Accidental plagiarism
\n(D) Indirect plagiarism
\nAnswer:
\n(D) Indirect plagiarism<\/p>\n
\nDirect Plagiarism: It is the act of copying other person’s work word to word without changing a single word. Paraphrase plagiarism: It involves making a few changes to someone else’s work, then passing it off as your own. Accidental plagiarism: It occurs when citations are missing or sources are cited incorrectly.<\/p>\nWhat factor could be included for plagiarism?<\/h2>\n
\n(B) Competition
\n(C) Hard working
\n(D) Management skills
\nAnswer:
\n(B) Competition<\/p>\n
\nTo avoid plagiarism, you should follow some rules:<\/p>\n\n
MCQ Questions for Class 10 Computer Applications with Answers<\/a><\/h4>\n","protected":false},"excerpt":{"rendered":"