Sri Chaitanya: Educational Institutions, India.
Sri Chaitanya: Educational Institutions, India.
Page 1
Sri Chaitanya Educational Institutions, India
3. After a fight with your friend, you did the following activities. Which of these activities
is not an example of cyber bullying?
a) You sent an email to your friend with a message saying that “Iam sorry”.
b) You sent a threatening message to you friend saying “Do not try to call or talk to
me”.
c) You created an embarrassing picture of your friend and uploaded on your account on
a social networking site.
d) You used your friend’s credentials to login.
4. Match the following:
Column A Column B
P. Plagiarism 1. Fakers, by offering special reward or money
prize asked for personal information, such
as bank account information.
q. Hackinf 2. Copy and paste information from the internet
into your report and then organize it.
r. Credit card fraud 3. The trial that is created when a person uses the
Internet.
s. Digital foot print 4. Breaking into computers to read private email
and other files.
a) p → 1, q → 4 , r → 2, s → 3.
b) p → 2, q → 4 , r → 1, s → 3.
c) p → 2, q → 3 , r → 1, s → 4.
d) p → 4, q → 2 , r → 3, s → 1.
5. I can keep you sign in.
I can remember your site preferences.
I can give you locally relevant content.
Who am I?
a) Virus b) Worm c) Phishing d) Cookies
Page 2
Sri Chaitanya Educational Institutions, India
6. A research student is expected to write a thesis on a topic. The student browses internet
for the topic and luckily friends it on internet. He copies and submits the entire thesis as
his own research work. Which of the following activities appropriately categories the act
of writer?
a) Plagarism b) Spamming c) Phishing d) Trojan
7.refers to sending bulk-mail by an identified or unidentified source.
a) Spoofing b) Spamming c) Phishing d) Pharming
8. Data which has no restriction of usage and is freely available to everyone under
Intellectual Property Rights is categorised as:
a) Open Source b) Open data
c) Open content d) Open Education
9. Which of the following is a disadvantage of ‘Proprietary’ software?
a) You need to be an expert to edit code.
b) It’s licensed
c) You have to pay for this type of software
d) It is launched after proper testing.
10. Gaining unauthorized access to a network or computer or digital files with malicious
intentions, is__
a) Cracking b) Phishing c) Banging d) Hacking
11. OSS stands for:
a) Open Source Software
b) Open Software Source
c) Open Soft Source
d) Open Shareware Software
12. Identify which these crimes will not come under cyber-crime.
a) Credit card frauds b) Child pornography
c) Debit card stealing d) Cyber stacking
13. (i) Cyber Trolls: Derogatory messages or comments posted online targeting people.
(ii) Cyber stalking: Online harassment wherein the victim is subjected to barrage of
online messages and emails.
a) Both statements are wrong.
b) (i) is correct (ii) is wrong
c) (i) is wrong (ii) is correct
d) Both are correct.
Page 3
Sri Chaitanya Educational Institutions, India
SECTION-B
Attempt any 10 questions:
14. _ means the software is freely accessible and can be freely used, changed,
improved, copied and distributed by all who wish to do so. And no payments are needed
to be made.
a) Oss b) Free Software
c) Proprietary software d) Shareware software
15. Identify which of these need not be careful about while using digital footprint:
a) What you share online b) Where you share
c) Which browser you use d) With whom you share
16. Identify correct email etiquette:
a) Don’t use email-disclaims
b) Need not to use proper structure & layout
c) Don’t follow gender sensitivity
d) Be Concede and to be point
17. Copyright symbol is:
a) © b) ® c) 𝖴 d) ∩
18. Which of these will not obeys cyber bullying
a) Harassing using internet
b) Demeaning in social network
c) Embarrassing in instant messengers
d) Bulk of emails in Gmail
19. Unauthorized monitoring of other people’s communications is called:
a) Eavesdropping b) Phishing
c) Pharming d) Spamming
20. We should exhibit proper manners and etiquettes while being online. Choose the right
net etiquette(s) from the following:
a) Avoid Cyber Bullying b) Respect Other’s Privacy
c) No Copyright violation d) All of the above
Page 4
Sri Chaitanya Educational Institutions, India
21. Saharsh is a student of class-9 and he is a very frequent uses of internal application. One
day he got an unpleased message on his instant messenger. What do you think he should
do?
a) Ignore it and start chatting to someone else.
b) Reply back to them and find out what their problem is
c) Shutdown the computer and hope they’ll leave him alone in future.
d) Go to his parents, teachers, or other trusted at adult and let them know that he feels
uncomfortable.
22. The act of fraudulently acquiring someone’s person and private information, such as
online account name, login information and passwords is called:
a) Phishing b) Fraud c) Plagarism d) Pharming
23. Linux, MySQL and Mozilla Firefox software come under category:
a) Proprietary b) FOSS c) Freeware d) Shareware
24. The data taken from a digital footprint can be used for:
a) Hacking b) Only for feedback
c) Showing relevant ads d) All the above
25. The legal and regulatory aspects of internet refers to:
a) Cyber space b) Cyber crime
c) Criminal law d) IT act
SECTION –C
Answer any 4 out of 5
26. Abdul deleted all his chats from all his social media accounts and he thinks that all his
traces are deleted completely. Is he right in thinking so?
a) Yes b) No c) May be d) Not sure
27. IPR stands for:
a) Intelligent Property Rights
b) Intellectual Property Reserve
c) Intellectual Property Rights
d) Intellectual Product Rights
Page 5
Sri Chaitanya Educational Institutions, India
28. _ is a way to communicate over Internet
a) Netiquette b) Cyber safely
c) Cyber Crime d) Phishing
29. (i) The security and privacy concerns are: Session data, Tracking information, Public
computers.
(ii) Data Protection solution categories are: Active, Protection, Preventive Measures.
a) (i) is correct, (ii) is incorrect
b) Both are incorrect
c) Both are correct
d) (i) is incorrect, (ii) is correct.
30. Assertion : Spamming comes under threats to data.
Reason : Spamming refers to the sending of bulk-mail by an identified or unidentified
source.
a) Statement is correct but Reason incorrect
b) None of them are correct
c) Statement is incorrect but Reason is correct
d) Statement along with Reason is correct.
Page 6