0% found this document useful (0 votes)
507 views14 pages

Unit - 3: Cyber Ethics - Chapter 9 Objective Type Questions

This document contains objective type questions about cyber ethics and intellectual property. It covers topics such as types of intellectual property like copyrights and patents, cyber crimes like viruses and identity theft, and ethical issues around plagiarism, privacy, and security. The questions are multiple choice, true/false, and fill in the blank format assessing understanding of these key concepts in cyber ethics.

Uploaded by

Vikas Shukla
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
Download as pdf or txt
0% found this document useful (0 votes)
507 views14 pages

Unit - 3: Cyber Ethics - Chapter 9 Objective Type Questions

This document contains objective type questions about cyber ethics and intellectual property. It covers topics such as types of intellectual property like copyrights and patents, cyber crimes like viruses and identity theft, and ethical issues around plagiarism, privacy, and security. The questions are multiple choice, true/false, and fill in the blank format assessing understanding of these key concepts in cyber ethics.

Uploaded by

Vikas Shukla
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
Download as pdf or txt
Download as pdf or txt
You are on page 1/ 14

Unit – 3

CYBER ETHICS - CHAPTER 9


Objective Type Questions
[A] choose the correct alternative

1. intellectual property is an

(a) industrial property

(b) copyright property

(c) free property

(d) both (a) and (b)

Ans. (d) both (a) and (b)

2. trojan horse is a ……….

(a) virus

(b) worm

(c) spyware

(d) adware

Ans. (a) virus

3.which of the following is a type of plagiarisim?

(a) partial

(b) collusion

(c) self

(d) all of these

Ans. (d) all of these

4. using someone else’s twitter handle to post something will be termed as

(a) fraud

(b) identity stealing


(c) online stealing

(d) violation

Ans. (b) identity theft

5. e-commerce means

(a) doing business online via the internet

(b) doing business off-line

(c) studying commerce via electronic media

(d) none of these

Ans. (a) doing business online via the internet

6. fraud is

(a) cheating others

(b) an internationally false representation of a fact

(c) to deceive another party in order to obtain a profit

(d) all of these

Ans. (b) an internationally false representation of a fact

7. intellectual property does not include

(a) creation of mind

(b) artistic work

(c) literary

(d) none of these

Ans. (d) none of these

[B] state whether these statements are true or false.

1. computer ethics are a set of commercial standards that govern the use of computers.

Ans. true
2. data protection is same as data privacy.

Ans. true

3. right to information Act was passed in 2002.

Ans. false

4. digital divide is determined by access to internet.

Ans. false

[C] fill in the blanks.

1. …………. Is a technology which keeps the messages secret from unauthorized secret from unauthorized
access.

Ans. encryption

2. ………… means malicious software which is created to impair a computer system.

Ans. malware

3. FOSSM is same as ……………

Ans. FLOSS

4. GNU stands for generally not ……….

Ans. Unix

Very Short Answer Type Questions


Q.1. what is netiquette?

Ans. the word netiquette is a combination of “net” (from internet) and etiquette. It means respecting
other users views and displaying courtesy when posting your views to online discussion groups.

Q.2. what is privacy in e-commerce?


Ans. privacy in e-commerce means the protection of privacy of all the parties involved in trading
through e-commerce.

Q.3. what is SSL?

Ans. secure socket layer (SSL) is a security protocol developed by Netscape communications to protect
communication over the internet.

Q.4. what is SET?

Ans. SET is secure electronic transaction. It is a system for ensuring the security of financial transaction
on the internet.

Q.5. what is computer ethics?

Ans. computer ethics is set of moral principles that governs the behaviour of a group or individual that
regulate the use of computers. These are like intellectual property rights, privacy concerns and how
computers affect society.

Q.6.what is intellectual property?

Ans. intellectual property refers to creations of the mind i.e. inventions; literary and artistic works;
symbols, names and images used in commerce.

Q.7. name five common intellectual property rights.

Ans. copyrights, patents, trademarks, trade secrets, industrial designs.

Q.8. what is patent?

Ans. a patent is a form of right granted by the government to an inventor to protect his/her invention. It
gives the holder the right to prevent anyone else from using it for a fixed period.

Q.9. what is copyright?

Ans. a copyright protects artistic and literary work. Copyright shall expire after 70 years of the last
author’s death.

Q.10. what is trademark?


Ans. trademarks are distinctive phrases, words, symbols or sings. They distinguish services or products
of one company from the others. Brands usually associate with distinctive trademarks.

Q.11. what is piracy?

Ans. the unauthorized use of another person’s work is known as piracy.

Q.12. what is information security is about protecting and preserving information. It also ensures
preserving the confidentiality, authenticity, availability and reliability of information.

Q.13. what is cyber crime?

Ans. cybercrime consists of using the internet for wrong intentions. It includes email spoofing cyber
defamation, sending threatening emails, etc.

Q.14. what isi a digital certificate?

Ans. digital certificates are electronic files containing user’s name, user’s public key and name of
certification authority, etc. That acts as an online passport.

Q.15. what is cyber bullying?

Ans. cyber bullying involves abuse of another person using threats, insults and hurtful remarks and
messages over the internet. There have been numerous reports of people who have been driven to
suicide by persistent cyber bullying.

Q.16. what are internet trolls?

Ans. internet trolls post messages and comments that try to evoke an emotional response from other
people. BBC presenter Richard bacon and other celebrities have spoken about being victims of trolls.

Q.17. define data encryption.

Ans. encryption scrambles the data on computers while transferring on a network. It is used to hide a
message from an unintended recipient.

Q.18. name two security threats in a network.

Ans. denial of service attacks and snooping.


Q.19. how does firewall protect us from network security threats?

Ans. firewalls help to filter the traffic by forming a barrier between a trusted and an untrusted network.
It can be hardware or software or both.

Q.20. Geetu is an artist. She posts her artwork on the internet. One day she comes to know that Shreyas
has downloaded one of the paintings that she has posted without her permission. He had further
printed that image on an invitation card. Has Shreyas does the right thing? Which right of geetu has he
infringed?

Ans. no, Shreyas has not done right thing. Intellectual property rights can be used by geetu.

Q.21. define the term digital divide.

Ans. the gap between technical knowledge of the people who have access to computers and internet
and those who do not have that access.

Q.22. ritwik wants to use a software but does not want to pay for it. Which type of software can he use?

Ans. open source software

Q.23. Riya wants to buy and sell goods online, which term is used to describe this process?

Ans. e-commerce

Q.24. Raman is an employee of ABC company. He wants a software for which he paid. What type of
software is Raman using?

Ans. Raman is using proprietary software.

Short Answer Type Questions


Q.1. what do you mean by e-commerce? How has it benefitted the customer?

Ans. e-commerce is the ability to do business online via internet. Consumers no longer need to travel to
shops or stores to get their daily needs. All they have to do in browse through the internet and purchase
the product needed using their computer connected to the internet and save their time and energy.

Q.2. why is privacy important in e-commerce?


Ans. privacy is the protection of personal information given online.]

The privacy of the users must be respected by ensuring that data collected is not sold to irresponsible
parties. The merchant should also say clearly In terms and conditions about how the data will be used.

Q.3. What is online fraud?

Ans. fraud committed using the internet is called online fraud.

Online fraud may occur in many forms such as:

Non-delivered goods

Stealing information

Fraudulent payments

Non-existent companies

Q.4. what is secure data transmission?

Ans. secure data transmission means applying enough technical safeguards so that the data travels
safely to its target, without being compromised or eavesdropped.

Same techniques are:

(i) SSL secure data transmission

(ii) data encryption

(iii) using safe protocols e.g. SFTP

Q.5. what is cryptography?

Ans. cryptography is a technology which keeps the messages secret from unauthorized access. Sender of
the information encrypts the data using a secret code and only the specified receiver can decrypt the
data using the same or different secret code.

To encrypt a message, the message is passed to an algorithm that transforms the message using a key
into a meaningless script called cryptogam or ciphertext. The ciphertext can be sent to the intended
recipient. The recipient has a key to decrypt the ciphertext back to the original message.

Short Answer Type Questions


Q.1. what do you by e-commerce? How has it benefitted the customer?
Ans. e-commerce is the ability to do business online via internet. Consumers no longer need to travel to
shops or stores to get their daily needs. All they have to do In browse through the internet and purchase
the product needed using their computer connected to the internet and save their time and energy.

Q.2. why is privacy important in e-commerce?

Ans. privacy is the protection of personal information given online.

The privacy of the users must be respected by ensuring that data collected is not sold to irresponsible
parties. The merchant should also say clearly in terms and conditions about how the data will be used.

Q.3. what is online fraud?

Ans. fraud committed using the internet is called online fraud.

Online fraud may occur in many forms such as:

Non-delivered goods

Stealing information

Fraudulent payments

Non-existent companies

Q.4. what is secure data transmission?

Ans. secure data transmission means applying enough technical safeguards so that the data travels
safely to its target, without being compromised or eavesdropped.

Some techniques are:

(i) SSL secure data transmission

(ii) data encryption

(iii) using safe protocols e.g. SFTP

Q.5. what is cryptography?

Ans. cryptography is a technology which keeps the messages secret from unauthorized access. Sender of
the information encrypts the data using a secret code and only the specified receiver can decrypt the
data using the same or a different secret code.

To encrypt a message, the message is passed to an algorithm that transforms the message using a key
into a meaningless script called cryptogram or ciphertext. The ciphertext can be sent to the intended
recipient. The recipient has a key to decrypt the ciphertext back to the original message.
Q.6. what is digital signature?

Ans. a digital signature is a digital code that can be authenticated through encryption and password
attached to an electronically transmitted message to uniquely identify the sender. Digital signatures
enable the recipient of the information to verify the authenticity of the information origin, and also
verify that the information is intact.

Q.7. define plagiarism?

Ans. plagiarism is the wrongful appropriation and stealing the publication of another author’s language,
thoughts, ideas as one own original work.

It is considered as an academic dishonesty and a breach of journalistic ethics. It is an act of fraud.

Q.8. what is software license?

Ans. a software license is a legal document that describes the legal rights pertaining to the authorized
use or redistribution of software. It defines the responsibilities of the parties entering into the license
agreement and may impose restrictions on how the software can be used.

Q.9. what is open source software?

Ans. open source software is a software that any programmer can download from the internet free and
modify with suggested improvements. The changes must be made available to all. Which can result in
better quality software

Q.10. what is proprietary software?

Ans. proprietary software are commercial or packaged software, it is copyrighted software that
prohibits the redistribution or modification of its program.

Q.11. what is free open source software movement?

Ans. free/open source software movement (FOSSM) or free/libre open source software movement
(FOSSM) is a social movement with the goal of obtaining and guaranteeing certain freedoms for
software users, namely the freedom to run the to redistribute copies with or without changes. Richard
Stallman formally founded the movement in 1983 by launching the GNU project. Stallman, later
established the free software foundation in 1985 to support the movement.
Q.12. what are digital property rights?

Ans. digital property rights includes data, internet accounts and other rights in the digital world.
Intellectual property rights can also exist in digital property such as pictures, music, movies, literary
works, web page, computer code. It refers to access and control of digital information.

Q.13. what is freedom of information?

Ans. freedom of information refers to a citizen’s right to access information that is held by the
government. The right to information is a fundamental right.

It helps in creating a more open and democratic society, challenging corruption and enhancing
transparency.

Q.14. write a short note on DRM.

Ans. digital rights management (DRM) is a systematic approach to copyright protection for digital media.
The purpose of DRM I to prevent unauthorized redistribution of digital media and restrict the ways
consumers can copy content they’ve purchased.

Digital rights refers to the relationship between copyrighted digital works (Such as film, music and art)
and user permissions and rights related to computers, networks and electronic devices. Digital rights
also refers to the access and control of digital information.

The definition of digital rights and responsibilities is having the right

And freedom to use all types of digital technology while using thin as technology in an acceptable and
appropriate manner. As a user of digital technology you also have the right to privacy and the freedom
of personal expression.

Q.15. can we use open source software (OSS) for all organizations?

Or

What are the disadvantages of open source software?

Ans. the open source software:

May not provide long term support

May not be secure enough

May not be scalable

So, they cannot be recommended for all organizations. Though, OSS software suite (LAMP-linux, my SQL
and PHP) can be used even for military organizations as they have community development groups,
security and scalability.
Q.16. Kuhu has just learnt how to do online banking. Name any two precautions that she should take to
prevent online fraud.

Ans. don not share user id and password with anyone.

Avoid doing transactions from cyber café and other public places.

Detailed answer: use bigger and strong password.

Do not use predictable passwords like mobile number, data of birth.

Long Answer Type Questions


Q.1. explain few netiquettes.

Ans. “netiquette” refers to internet etiquette. This simply means the use of good manners in online
communication such as email, forums, blogs, and social networking sites to name a few. It is important to
use netiquette because online communication is non-verbal.

(i) accuracy of information: misleading others is obviously a major breach of online etiquette. This is true
even if it’s unintentional. Check facts before providing information or giving you shouldn’t be acting like
you are.

(ii) use internet resources ethically: online study resources should be used to support learning, not replace
it.

(iii) promote healthy discussions: to get the most out of online forums a useful netiquette guideline is to
promote he healthy discussion. You can help your online community by posing questions, sharing
experiences, providing positive feedback, asking follow-up questions, and referring to information
sources.

(iv) ignore inflammatory comments by trolls: it’s generally best to ignore trolls. These are internet users
who try to bait other users into a reaction.

(v) respect others as equal: show a little respect and humility online.

(vi) remember, your words are permanent: be careful with what you post online. Once it’s out there,
you may not be able to get it back.

(vii) make your point in a nice way: write in a way to get the kind of reaction you want. A litter
thoughtfulness, strategy and netiquette can go a long way in online discussion.

Q.2. explain IPR and what are the two main types of IPR?
Ans. IPR (intellectual property rights) allow creators, or owners of patents, trademarks or copyrighted
works to benefit from their own work or investment in a creation. Owners holding IPR can prevent the
use of their intellectual property.

Types

Patent copyright trademark layout trade secret

Trademarks: trademarks have been defined as any sign, or any combination of signs capable of
distinguishing the goods or services of one undertaking from those of other underwings.

Copyright: copyright is a legal means of protecting an author’s work. It is a type of intellectual property
that provides exclusive publication, distribution, and usage rights for the author. Therefore, any original
content published on the web is protected by copyright law.

Q.3. What is software piracy?

Ans. software piracy is any attempt to break the licence terms of a piece of software. This includes
downloading and using a program without paying for it, as well as buying selling or any other piece of
software. It could mean extracting code from a program, or modifying it without permission in oreder to
do something that the developers did not wish you to do. When you buy software, music or films legally,
copyright law forbids us from:

Giving a copy to a friend

Making a copy and then selling it

Using the software on a network (unless the license allows it, eg it is a business license)

Renting the software without the permission of the copyright holder

The practice of copying software is a serious problem in some countries. Copying music, films and
software illegally means that there is less money available to pay the writers, developers and artists.

Q.4. write a short note on secure electronic transaction.

Ans. secure electronic transaction is a secure protocol developed by master card and visa in
collaboration. Theoretically, it is the best security protocol. It has the following components.

Card holder’s digital wallet software: digital wallet allows the card holder to make secure purchases
online via point and click interface.

Merchant software: this software helps merchants to communicate with potential customers and
financial institutions in a secure manner.

Payment gateway server software: payment is used by financial institutions to issue digital certificates to
card holders and merchants, and to enable them to register their account agreements for merchant’s
certificate request.
Certificate authority software: this software is used by financial institutions to issue digital certificates to
card holder and merchants, and to enable them to register their account agreements for secure
electronic commerce.

Q.5. write down the essential requirements for safe e-payments?

Ans. security is an essential part of any transaction that takes place over the internet. Customers will
lose his/her faith in e-business if its security is compromised. Following are the essential requirements
for safe e-payments/transactions-

Confidentiality: information should not be accessible to any unauthorized person. It should not be
intercepted during the transmission.

availability: information should be available wherever and whenever required within a time limit
specified.

Authenticity: there should be a mechanism to authenticate a user before giving him/her an access to the
information.

Non-reputability: it is the protection against the denial of order or denial of payment. Once a sender a
message, the sender should not be able to deny sending the message. Similarly the recipient of message
should not be able to deny the receipt.

Encryption: information should be encrypted add decrypted only by an authorized user. ]

Auditability: data should be recorded in such a way that it can be audited for integrity requirements.

Q.6. how can someone improve privacy concerns in e-commerce?

Ans. there are some following ways to improve privacy concerns:

Choice/consent: give consumers option as to how any personal information collected from them may be
used.

Participation: give consumers the ability to access data about themselves i.e. to view the data in a
entity’s files and to contest that data’s accuracy and completeness.

Security: ensure that consumer data is accurate and secure. To reassure data integrity collectors must
take reasonable steps, such as using only reputable sources of data and cross-referencing data against
multiple sources. Security involves both managerial and technical measures to protect against loss and
the unauthorized access, destruction, use, or disclosure of the data.

Q.7. explain the types of plagiarism.

Ans. following are the types of plagiarism:


Collusion: occurs when one student produces work and another student to copy it. It both students
submit the work, both the students will be deemed to have colluded.

Complete plagiarism: occurs when a piece of work is copied entirely from one or more source.

Partial plagiarism: occurs when sections of a document are directly copied and unacknowledged source
(S) within an assignment.

self-plagiarism: occurs when you re-use your own previously written work or data in a new assignment
and do not reference it appropriately.

Copying and pasting : is done on the availability of information on the internet and electronic journals.

Word switch: occurs in case you copy a sentence or paragraph into your assignment and change a few
works, it will still be considered to be plagiarism.

Concealing sources: means that you have cited a piece of work from a text. This does not mean you do
not have to reference any other text you must acknowledge the source, even if it is the very next
paragraph.

Inadvertent plagiarism: occurs as a result of poor study skills, but it is still considered to be academic
misconduct.

Q.8. explain the concept of digital divide stating causes for it and measures to reduce the divide.

Ans. the digital divide, or the digital split, is a social issue referring to the differing amount of
information between those who have access to the internet and those who do not have access. The
term became popular among concerned parties, such as scholars, policy makers, and advocacy groups,
in the late 1990s.

Broadly speaking, the difference is not necessarily determined by the access to the internet, but by
access to ICT (information and communication technology) and to media that the different segments of
society can use. With regards to the internet, the access is only one aspect, other factors such as the
quality of connection and related services should be considered.

The problem is often discussed in international context, indicating certain countries are far more
equipped than other developing countries to exploit the benefits from the rapidly expanding internet.
The digital divide is not indeed a clear single gap which divides a society into two groups. Researches
report that disadvantage can take such forms as lower.

Performance computers, lower-quality or high price connections difficulty of obtaining technical


assistance, and access to subscription-based contents.

The idea that some information and communication technologies are vital to quality civic life is not new.
Some suggest that the internet and other ICTs are somehow transforming society, improving our mutual
understanding, eliminating power differentials, realizing a truly free and democratic world society, and
other benefits.

Download other chapter's solutions

cbsepractice.in

You might also like