Smridh has recently changed his school so he is not aware of the people, but someone is posting
negative , demeaning comments on his social media profile. He is also getting repeated mails
from unknown people. Everytime he goes online, he finds someone chasing him online.
i. Smridh is a victim of …………. :
a. Eavesdropping
b. Stolen identity
c. Phishing
d. Cyber stalking
ii. The action that Smridh should take :
a. He should ONLY share with his friends
b. He should NOT share with anyone as it can cause serious problem
c. He should immediately report to the police
d. He should bring to the notice of his parents and school authorities.
iii. …………………….. is a set of moral principles that governs the behaviour of a group or
individual and regulates the use of computers.
a. Copyright
b. Computer ethics
c. Property rights
d. Privacy law
iv. Smridh needs to protect his personal information or data from unintentional and intentional
attacks and disclosure which is termed as ………...
a. Digital right
b. Copyright
c. Privacy
d. Intellectual property
v. The act of fraudulently acquiring someone’s personal and private information, such as online
account names, login information and passwords is called as ……………
a. Phishing
b. Fraud
c. Scam
d. Plagiarism
The school offers Wi-Fi to the students of Class XII. For communication, the network security-
staff of the school is having a registered URL "schoolwifi.edu". On 17th September 2017,
emails were received by all the students regarding expiry of their passwords. Instructions were
also given renew their password within 24 hours by clicking on particular URL provided.
On the bases of the above case study, answer the questions given below:
1
i. Specify which type of cybercrime is it.
a) Spamming
b) Phishing
c) Identity Theft
d) Hacking
ii. URL stands for____________
iii. Unsolicited commercial email is known as:
a) Malware
b) Virus
c) Spam
d) Spyware
iv. WiFi stands for ___________
v. Ideally, what characters should be used in a password to make it strong?
a) Letters and numbers only
b) Mixed Case (Upper and Lower)
c) Special characters
d) All of above
Vidya Devi, a retired school principal, was inspired by her granddaughter who uses technology
for her day to day activities. Being a learner and teacher all her life, she wanted to open an email
account and interact with her friends and family. Her granddaughter created an email account for
her and gradually she started sending mails to her friends and family. This was a big achievement
for her. Her granddaughter explained how emails are sent, how to create an email address, what
protocols are used. Some of these details were too technical for her, but she never gave up. There
are few doubts/misconceptions in her mind which you can help her with.
i. Unsolicited e-mail advertising is known as
a. newsgroup
b. junk ads
c. spam
d. none of the above
ii. Which of the following is the correct format of email address?
a. name@website@info
b.
[email protected]c. www.nameofwebsite.com
d. name.website.com
iii. Mail access starts with client when user needs to download email from the
a. mail box
b. mail server
2
c. IP server
d. Internet
iv. To use email service, one needs to register with
a. Internet Service Provider
b. Email Service Provider
c. A company
d. No need to register
v. Bcc stands for to send the copy of mail.
a. Black carbon copy
b. Blue carbon copy
c. Blind carbon copy
d. Block chain copy
Ramanpreet has to work on his science project which deals with electromagnetic waves. A lot of
research workis required by him for the same. He uses Google Chrome to search for the relevant
matter.
a. Website
b. Web browser
c. Web Page
d. Web Page
ii. He finally locates some useful information and clicks on the link provided to access the
website. The link is actually known as a_____________.
a. Domain name
b. Web Page
c. URL
d. IP address
iii. As Ramanpreet works on his project, he collects and curates information. Whenever he clicks
on the link the same piece of information is shown and the content is not clickable. Ramanpreet
is accessing a/an _______ website.
a. Dynamic
b. Textual
c. Outdated
d. Static
iv. A web cookie is a small piece of data that is __________
a. sent from a website and stored in user’s web browser while a user is browsing a website
b. sent from user and stored in the server while a user is browsing a website
c. sent from root server to all servers
d. sent from the root server to other root servers
v. HTML stands for________
3
Sumit has to prepare a project on “Swachh Bharat Shreshth Bharat”.
He decides to get information from the Internet. He downloads three web pages (webpage1,
webpage 2, webpage 3) containing information on the given topic.
1. He read a paragraph on from webpage 1 and rephrased it in his own words. He finally pasted
the rephrased paragraph in his project.
2. He downloaded three images of from webpage 2. He made a collage for his project using these
images.
3. He also downloaded an icon from web page 3 and pasted it on the front page of his project
report.
i. Step1 An Example of __________
a. Plagiarism
b. Paraphrasing
c. copyright infringement
d. Intellectual Property right
ii. Step 2 An act of __________
a. plagiarism
b. copyright infringement
c. Intellectual Property right
d. Digital Footprints
iii. Step 3 An act of _________
a. Plagiarism
b. Paraphrasing
c. copyright infringement
d. Intellectual Property right
iv. A website is a collection of ___________
a. Web Servers
b. Web pages
c. Browsers
d. Hyperlinks
v. The process of getting web pages, images and files from a web server to local computer is
called ______
a. FTP
b. Uploading
c. Downloading
d. Remote access