0% found this document useful (0 votes)
34 views3 pages

Chapter 1notes

Chapter 1 covers key concepts in cyber ethics, cybercrime, and online safety, including definitions of plagiarism, hacking, and digital footprints. It includes fill-in-the-blank questions, multiple choice questions, and short answer prompts to assess understanding of these topics. The chapter emphasizes the importance of ethical behavior and security measures in the digital world.

Uploaded by

samar1976
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
34 views3 pages

Chapter 1notes

Chapter 1 covers key concepts in cyber ethics, cybercrime, and online safety, including definitions of plagiarism, hacking, and digital footprints. It includes fill-in-the-blank questions, multiple choice questions, and short answer prompts to assess understanding of these topics. The chapter emphasizes the importance of ethical behavior and security measures in the digital world.

Uploaded by

samar1976
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd

Chapter 1 – Computer (Cyber Ethics, Cybercrime, Safety, Digital Footprints, Number

Systems)

A. Fill in the Blanks (15 Qs)


1. Cyber Ethics refers to a set of procedures, moral principles, and ethical practices that
regulate the use of computers and the internet.
2. The simplest way to prevent plagiarism is through proper Citation.
3. Cyberbullying is an act of harming, harassing, or targeting a person using the internet
deliberately.
4. An illegal intrusion into a computer system or network is called Hacking.
5. Unwanted bulk emails from unknown sources are called Spam.
6. When software is copied and distributed illegally, it is called Software Piracy.
7. A Copyright is a right granted by law to the creator for his original work.
8. The Right to Privacy is the claim of individuals to control when and how their
personal information is shared.
9. The practice of using another person’s thoughts as one’s own without credit is called
Plagiarism.
10. The impression about a person that exists on the internet due to his online activity is
called Digital Footprint.
11. The process of transforming data into unreadable code is called Encryption.
12. The process of converting encrypted data back into readable form is called
Decryption.
13. A Firewall is a security system that prevents unauthorized access to a network.
14. Strong Passwords help to protect against hackers and cybercrime.
15. The practice of bombarding mail servers with bulk emails is called Mail Bombing.

B. Multiple Choice Questions (25 Qs)


1. The unwanted bulk emails from unknown sources are called:
a) Spam b) Trash c) Draft → Spam
2. When a single licensed software copy is loaded onto many computers, it is called:
a) Softlifting b) Citation c) Phishing → Softlifting
3. A legal right granted by law to the creator for his original work is:
a) Copyright b) Patent c) Trademark → Copyright
4. The process of transforming data into unreadable code is:
a) Decoding b) Encryption c) Decryption → Encryption
5. Which of the following is an unethical practice?
a) Plagiarism b) Citation c) Patent → Plagiarism
6. Which one is used to prevent unauthorized access to a network?
a) Firewall b) Router c) Server → Firewall
7. Spam emails can deliver:
a) Viruses b) Worms c) Spyware d) All of these → All of these
8. Which password is the strongest?
a) 123456 b) myname c) P@ssw0rd!2024 → P@ssw0rd!2024
9. A patent is valid in India for:
a) 10 years b) 20 years c) 50 years → 20 years
10. Which of the following refers to online good behavior?
a) Netiquette b) Spam c) Malware → Netiquette
11. Which practice is considered software piracy?
a) Buying licensed software b) Copying CDs illegally c) Downloading updates →
Copying CDs illegally
12. The act of tricking users into clicking hidden content is:
a) Phishing b) Vishing c) Clickjacking → Clickjacking
13. A digital footprint can be:
a) Active b) Passive c) Both → Both
14. Which ensures that online data is unreadable to hackers?
a) Decryption b) Encryption c) Spamming → Encryption
15. Which law protects artistic and literary works?
a) Patent Law b) Copyright Law c) Trademark Law → Copyright Law
16. Intellectual property rights are related to:
a) Creations of the mind b) Online shopping c) Software updates → Creations of the
mind
17. Which software copying practice is known as “Softlifting”?
a) Using trial software b) Installing licensed software on multiple PCs c) Registering
software → b
18. Which of these is an example of plagiarism?
a) Writing in your own words b) Copying text without citation c) Citing sources
properly → b
19. The combination of “voice” and “phishing” is called:
a) Spamming b) Vishing c) Hacking → Vishing
20. Which is a stronger password?
a) password b) Pass123 c) P@55word2024! → c
21. Which of these is NOT a type of cybercrime?
a) Malware b) Spam c) Firewall → Firewall
22. Which organization grants patents in India?
a) RBI b) Intellectual Property Office c) Election Commission → Intellectual
Property Office
23. The online act of bullying is known as:
a) Phishing b) Cyberbullying c) Plagiarism → Cyberbullying
24. What does HTTPS in a web address mean?
a) Website is secured b) Website is slow c) Website is under construction → Secured
25. What is the validity of a copyright after the creator’s death?
a) 20 years b) 50 years c) 70+ years → 70+ years

C. One Word Answer (10 Qs)


1. Practice of copying software illegally → Software Piracy
2. Sending bulk unwanted emails → Spamming
3. Security system that blocks unauthorized access → Firewall
4. Moral rules for internet use → Cyber Ethics
5. Using others’ work without credit → Plagiarism
6. Malicious trick of hidden clicks → Clickjacking
7. Record of online activities → Digital Footprint
8. Combination of voice and phishing → Vishing
9. Legal protection of logos/names → Trademark
10. Converting unreadable data back → Decryption

D. Critical Thinking / Short Answer (10 Qs)


1. Why is plagiarism considered unethical? → It violates intellectual property;
prevented by citation.
2. Differentiate hacking and ethical hacking. → Hacking = illegal intrusion, Ethical
hacking = for security.
3. Suggest two safety measures for children online. → Supervised browsing, strong
passwords.
4. Why avoid open Wi-Fi? → Hackers can steal personal data.
5. How do digital footprints affect reputation? → They leave a permanent online
record.
6. Why are strong passwords important? → Harder for hackers to crack.
7. Two ways to protect IPR? → Patent inventions, copyright works.
8. Why are spam emails dangerous? → They can carry viruses/phishing attacks.
9. Why is netiquette important? → Ensures respect, honesty, safety online.
10. Why use encryption in online transactions? → Protects sensitive data.

E. One Line Definitions (10 Qs)


1. Cybercrime → Criminal activities involving computers/networks.
2. Cyber Ethics → Moral rules for computer/internet use.
3. Hacking → Illegal intrusion into systems.
4. Spamming → Sending unwanted bulk emails.
5. Plagiarism → Using others’ work without credit.
6. Software Piracy → Illegal copying/distribution of software.
7. Intellectual Property Rights → Legal rights protecting creative works.
8. Encryption → Turning data into unreadable form.
9. Digital Footprint → Impression of a person’s online activity.
10. Netiquette → Respectful, ethical online behavior.

You might also like