Society Laws and Ethics Assertion Reasoning Case Study Questions
1. Which of the following are the best security measures that should be taken against phishing attacks ?
a) Never open unknown or suspicious email attachments.
b) Never share your personal information such as email, credit card number, etc on unknown sites.
c) Both a and b
d) None of these
Ans: c
2. When a person is harassed repeatedly by being followed, called or be written to he/ she is a target of
a) Bullying
b) Stalking
c) identity theft
d) phishing
Ans: b
3. IT Act of the Indian Parliament notified on ___________
a) 17 January 2001
b) 25 October 2002
c) 17 October 2000
d) 25 April 2000
Ans: c
4. What is the name of the IT Law that India is having in the Indian legislature ?
a) India’s Technology (IT) Act, 2000
b) India’s Digital Information Technology (DIT) Act, 2000
c) India’s Information Technology (IT) Act, 2000
d) The Technology Act, 2008
Ans: c
5. Sarah’s classmate sent her a message on Facebook “You are a Loser”. Sarah is a victim of:
a) Phishing
b) Eavesdropping
c) Cyberbullying
d) Trolling
Ans: c
6. What can happen when you give your personal data (email, address, photos you post…) in exchange for free apps and services?
a) Nothing can happen. Your data is not allowed to be passed on to anyone
b) It isn’t really used, it’s just compulsory to ask for that information
c) When giving your email you’re automatically entered in a lottery where you can win something
d) Everything you do online is of value and is used by companies looking to target their advertising
Ans:d
Assertion Reason Based Questions.
1. Assertion (A) : The information which was posted by you in online can be seen by everyone who is online because internet is the world’s biggest information exchange tool.
Reason (R) : Don’t give or post any personal information like your name, address of the school/office / home, phone numbers, age, sex, credit card details etc.,
Choose the correct answer:
a) Both A and R are true and R is correct explanation of A
b) Both A and R are true and R is not correct explanation of A
c) A is true but R is false.
d) A is false but R is True
Ans: a)
2. Assertion (A): According to research conducted by Symantec, nearly 8 out of 10 individuals are subject to the different types of cyber bullying in India.
Reason (R) : Don’t give or post any personal information like your name, address of the school/office / home, phone numbers, age, sex, credit card details etc.,
Choose the correct answer:
a) Both A and R are true and R is correct explanation of A
b) Both A and R are true and R is not correct explanation of A
c) A is true but R is false.
d) A is false but R is True
Ans: b)
3. Assertion (A): The digital footprint is created automatically when you work on internet and providing data in any form.
Reason (R) : The active digital footprint is created unintentionally without the user’s consents.
Choose the correct answer:
a) Both A and R are true and R is correct explanation of A
b) Both A and R are true and R is not correct explanation of A
c) A is true but R is false.
d) A is false but R is True
Ans: c)
True and False Question
1. Cyberbullying is the act of intimidating, harassment, defaming, or any other form of mental degradation through the use of electronic means or modes such as social media.
a) True
b) False
Ans: (a) True
2. Rohan said some abusive words for Shyam in the class. This a type of cyber bullying.
a) True
b) False
Ans: (b) False
3. It is okay to post some negative comments about someone to defame him/ her.
a) True
b) False
Ans: (b) False
4. It is a better way to dispose off the e-waste in an open field area.
a) True
b) False
Ans: (b) False
5. Cyber law helps protect users from harm by enabling the investigation and prosecution of online criminal activity.
a) True
b) False
Ans: (a) True
Case study based questions
1. Smridh has recently changed his school so he is not aware of the people, but someone is posting negative ,demeaning comments on his social media profile. He is also getting repeated mails from unknown people. Everytime he goes online, he finds someone chasing him online.
i) Smridh is a victim of …………. :
a) Eavesdropping
b) Stolen identity
c) Phishing
d) Cyber stalking
Ans: d
ii) The action that Smridh should take :
a) He should ONLY share with his friends
b) He should NOT share with anyone as it can cause serious problem
c) He should immediately report to the police
d) He should bring to the notice of his parents and school authorities.
Ans: d
iii) …………………….. is a set of moral principles that governs the behaviour of a group or individual and regulates the use of computers.
a) Copyright
b) Computer ethics
c) Property rights
d) Privacy law
Ans: b
2. After practicals, Atharv left the computer laboratory but forgot to sign off from his email account. Later, his classmate Revaan started using the same computer. He is now logged in as Atharv. He sends inflammatory email messages to few of his classmates using Atharv’s email account.
i) Revaan’s activity is an example of which of the following cyber crime?
a) Hacking
b) Identity theft
c) Cyber bullying
d) Plagiarism
Ans: b
ii) If you post something mean about someone, you can just delete it and everything will be Ok .
a) True
b) False
Ans: b
iii) Anonymous online posts/comments can _________ be traced back to the author.
a) Always
b) Never
c) Sometimes
d) Many Times
Ans: a