0% found this document useful (0 votes)
413 views

Class 10 Computer CH 6 Exercise and Que Ans

Uploaded by

Chhavi Gautam
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
413 views

Class 10 Computer CH 6 Exercise and Que Ans

Uploaded by

Chhavi Gautam
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

Class -10th

Exercise Chapter-6 Cyber ethics


Objective type Questions:
1. Fill in the blanks with the correct words.
1. Digital unification refers to providing the same opportunities to
all sections of people to access information technology and the
know-how to use it.
2. Spyware is a computer program that secretly gathers
information about a user and relays it to advertisers or similar
interested parties.
3. A cracker is a person who gains unauthorized access to a
computer system for the purpose of stealing or corrupting data.
4. The public key of a digital certificate is known to every user.
5. A firewall is a security system designed to protect a computer
from hacker attacks.
6. The O in FOSS stands for open.
7. Apache is an open source web server.
8. A trademark is a word, name, or symbol that is used to identify
a product.
2. Write T for true statement and F for false one. Correct the false
statement.
a. Website owners often use cookies to collect information on a
user’s web surfing habits.(T)
b. The hacker is a person who gains unauthorised access for the
benefit of the company.(T)
c. Phishing aims to trick people into revealing sensitive information
like credit card numbers and passwords.(T)
d. During a commercial transaction, the URL of the website start
with http://. (F)
Correct- https:
e. You can copy any information from the internet and present the
same as your own. (F)
Correct: One needs to obtain written permission from the
copyright owner and/ or cite the source when using information.
f. Hackers are also known as crackers.(T)
Note- The black hat hackers are also known as crackers.
g. A patent is a legal right that grants the creator of an invention
the sole right on it. (T)
h. GIMP is an open source database management system.(F)
Correct- GIMP is not an open source database management
system. It is an open source graphics tool.

3. Choose the correct option.


a. Which of the following is an advantage of e-commerce?
i. It provides 24x7 service ii. It helps reduce paperwork iii. It
saves time iv. All of these
b. Which is not true about FOSS?
i. It is free. ii. It can be copied and redistributed. iii. The source
code can be modified. iv. The source code is not available.
c. Which one is not an open source software?
i. Ubuntu ii. MS Office iii. GIMP iv. MySQL
d. L in SSL stands for
i. Lock ii. Layer iii. Limit iv. License
e. A/An ……… is a security system designed to protect a computer
from hacker attacks.
i. Password ii. Firewall iii. Copyright iv. Antivirus
f. Common types of intellectual property rights include
i. copyright ii. Trademark iii. Patent iv. All of these
g. SSL involves?
i. Public Key ii. Private Key iii. Both i & ii iv. Neither i nor ii
h. Which among the following is an illegal activity?
i. Phishing ii. Plagiarism iii. Both i & ii iv. Neither i nor ii
3.Short Answer Type Questions
a. What is a copyright law?
Ans: Copyright laws typically protect creative works, like books,
movies, music, paintings, photographs and software.
b. What is a digital certificate?
Ans:A digital certificate is a kind of digital code or credential that
authenticates the identity of a server.

c. What is the use of antivirus software?


Ans: Antivirus software detects and remove virus and other
. malicious software from a computer.
d. What is plagiarism?
Ans: It is an act of using other’s ideas and work without
acknowledging the source of that work.
e. Write any two advantages of e-commerce?
Ans: i) E-commerce is available 24x7 around the year.
ii) The process of buying and selling is relatively fast.

4.Long Answer Type Questions


a. What are the four rules that define a free sostware?
Ans: Four rules define a free software are –
1. Run the program for any purpose.
2. Modify the program according to your need.
3. Redistribute copies.
4. Distribute modified version of program.

b. What is the software license? What are the two common


categories of software with respect to license?
Ans: A software license is an agreement between a user and
the owner of a software program that defines what all the user
can do with that software. Using it in any other way would
amount to an infringement of the software license.
There are two common categories of software under copyright
law to grant the license specific right.
i. Proprietary software
ii. Free and open-source software(FOSS)
c. What is plagiarism? How will you avoid it?
Ans: Plagiarism is a serious offence that results in severe
penalties. In order to avoid plagiarism one needs to obtain
written permission from the copyright owner and/ or cite the
source when using information.
d. What is the difference between encryption and decryption?
Ans: Encryption is the process of encoding data so that
unauthorized users cannot access it.
Decryption is the process of decoding encrypted data into a
human readable form.
e. Write are the rules for creating a strong password?
Ans: You should follow the points given below to create a
secure password.
Password length: 1. Create a password that is at least 8-10
characters in length. A ten character password is considered to
be sufficiently secure.
2. Do not use the same password on multiple websites.
Password complexity: Preferably, a password should contain
at least one character from uppercase and lowercase letters,
numbers and special characters.

You might also like