Society Laws and Ethics Assertion Reasoning Case Study Questions

 

1. Which of the following are the best security measures that should be taken against phishing attacks ?

a) Never open unknown or suspicious email attachments.

b) Never share your personal information such as email, credit card number, etc on unknown sites.

c) Both a and b

d) None of these

Ans: c

 

2. When a person is harassed repeatedly by being followed, called or be written to he/ she is a target of

a) Bullying

b) Stalking

c) identity theft

d) phishing

Ans: b

 

3. IT Act of the Indian Parliament notified on ___________

a) 17 January 2001

b) 25 October 2002

c) 17 October 2000

d) 25 April 2000

Ans: c

 

4. What is the name of the IT Law that India is having in the Indian legislature ?

a) India’s Technology (IT) Act, 2000

b) India’s Digital Information Technology (DIT) Act, 2000

c) India’s Information Technology (IT) Act, 2000

d) The Technology Act, 2008

Ans: c

 

5. Sarah’s classmate sent her a message on Facebook “You are a Loser”. Sarah is a victim of:

a) Phishing

b) Eavesdropping

c) Cyberbullying

d) Trolling

Ans: c

 

6. What can happen when you give your personal data (email, address, photos you post…) in exchange for free apps and services?

a) Nothing can happen. Your data is not allowed to be passed on to anyone

b) It isn’t really used, it’s just compulsory to ask for that information

c) When giving your email you’re automatically entered in a lottery where you can win something

d) Everything you do online is of value and is used by companies looking to target their advertising

Ans:d

 

Assertion Reason Based Questions.

 

1. Assertion (A) : The information which was posted by you in online can be seen by everyone who is online because internet is the world’s biggest information exchange tool.

Reason (R) : Don’t give or post any personal information like your name, address of the school/office / home, phone numbers, age, sex, credit card details etc.,

Choose the correct answer:

a) Both A and R are true and R is correct explanation of A

b) Both A and R are true and R is not correct explanation of A

c) A is true but R is false.

d) A is false but R is True

 

Ans: a)

 

2. Assertion (A): According to research conducted by Symantec, nearly 8 out of 10 individuals are subject to the different types of cyber bullying in India.

Reason (R) : Don’t give or post any personal information like your name, address of the school/office / home, phone numbers, age, sex, credit card details etc.,

Choose the correct answer:

a) Both A and R are true and R is correct explanation of A

b) Both A and R are true and R is not correct explanation of A

c) A is true but R is false.

d) A is false but R is True

Ans: b)

 

3. Assertion (A): The digital footprint is created automatically when you work on internet and providing data in any form.

Reason (R) : The active digital footprint is created unintentionally without the user’s consents.

Choose the correct answer:

a) Both A and R are true and R is correct explanation of A

b) Both A and R are true and R is not correct explanation of A

c) A is true but R is false.

d) A is false but R is True

Ans: c)

 

 

True and False Question

1.  Cyberbullying is the act of intimidating, harassment, defaming, or any other form of mental degradation through the use of electronic means or modes such as social media.

a) True

b) False

Ans: (a) True

 

2. Rohan said some abusive words for Shyam in the class. This a type of cyber bullying.

a) True

b) False

Ans: (b) False

 

3. It is okay to post some negative comments about someone to defame him/ her.

a) True

b) False

Ans: (b) False

 

4. It is a better way to dispose off the e-waste in an open field area.

a) True

b) False

Ans: (b) False

 

5. Cyber law helps protect users from harm by enabling the investigation and prosecution of online criminal activity.

a) True

b) False

Ans: (a) True

 

Case study based questions

1. Smridh has recently changed his school so he is not aware of the people, but someone is posting negative ,demeaning comments on his social media profile. He is also getting repeated mails from unknown people. Everytime he goes online, he finds someone chasing him online.

i) Smridh is a victim of …………. :

a) Eavesdropping

b) Stolen identity

c) Phishing

d) Cyber stalking

Ans: d

 

ii) The action that Smridh should take :

a) He should ONLY share with his friends

b) He should NOT share with anyone as it can cause serious problem

c) He should immediately report to the police

d) He should bring to the notice of his parents and school authorities.

Ans: d

 

iii)  …………………….. is a set of moral principles that governs the behaviour of a group or individual and regulates the use of computers.

a) Copyright

b) Computer ethics

c) Property rights

d) Privacy law

Ans: b

 

2. After practicals, Atharv left the computer laboratory but forgot to sign off from his email account. Later, his classmate Revaan started using the same computer. He is now logged in as Atharv. He sends inflammatory email messages to few of his classmates using Atharv’s email account.

i) Revaan’s activity is an example of which of the following cyber crime?

a) Hacking

b) Identity theft

c) Cyber bullying

d) Plagiarism

Ans: b

 

ii) If you post something mean about someone, you can just delete it and everything will be Ok .

a) True

b) False

Ans: b

 

iii) Anonymous online posts/comments can _________ be traced back to the author.

a) Always

b) Never

c) Sometimes

d) Many Times

Ans: a

Copywrite © 2020-2024, CBSE Python,
All Rights Reserved