CBSE CS

MCQ on Cyber Ethics for class 10

Answers the following questions:

Question 1. What does not includes netiquettes?
a) use proper salutation
b)be respectful
c) disobey copyright laws
d) all of the above

Answer

#ANSWER. C) disobey copyright laws





Question 2. following are not types of fraud?
a) ambiguity
b) identity thept
c) hacking
d) none of the above

Answer

#ANSWER. d) none of the above





Question 3. tools used for shoulder surfing?
a) binoculars
b) vision enhancing devices
c) both a and b
d) none of these

Answer

#ANSWER. c) both a and b





Question 4. what is considered unfriendly return policy?
a) employment scam
b) phishing
c) as-is
d) all of these

Answer

#ANSWER. C) as-is





Question 5. Which of these not includes safeguarding your privacy?
a) people
b) pretexting
c) technology
d) none of these

Answer

#ANSWER. b) pretexting





Question 6. full form of GPS?
a) global positioning system
b) global patent system
c) both of these
d) none off these

Answer

#ANSWER. a) global positioning sytem





Question 7. what is softlifting?
a) unauthorized copies of product
b) malicious program
c) buying once and sharibng it with others
d) none of these

Answer

#ANSWER. c) buying once and sharing it with others





Question 8. plagiarism includes?
a) to steal new ideas
b) to commit literary thept
c) to use ideas without crediting
d) ALL of these

Answer

#ANSWER. D) ALL OF THESE





Question 9. what refers to spam?
a) sending bulk emails
b) sending email
c) sending malicious emails
d) all of above

Answer

#ANSWER. a) sending bulk emails





Question 10. keyloggers can be used in?
a) pc
b) cell phone
c) both of these
d) none of these

Answer

#ANSWER. C) BOTH OF THESE




Cyber ethics MCQ for class 10


Question 11. full form of TPS?
a) technical private service
b) transport protection service
c) technical protection service
d) none of these

Answer

#ANSWER. c) technical protection service





Question 12. what is cipher text?
a) plain text
b) encrypted keys
c) encrypted text
d) none of these

Answer

#ANSWER. C) ENCRYPTED TEXT





Question 13. FULL FORM OF PAP?
A) PRIVACY AUTHORIZATION PROTOCOL
B) PROTOCOL AUTHENTICATION PASSWORD
C) PASSWORD AUTHENTICATION PROTOCOL
D) NONE OF THESE

Answer

#ANSWER. C) PASSWORD AUTHENTICATION PROTOCOL





Question 14. WHAT IS A TRADEMARK INFRINGEMENTS?
A) USING TRADEMARKS
B) USING ANOTHER COMPANY TRADEMARK WITH CONSENT
C) USING ANOTHER COMPANY TRADEMARKS
D0 NONE OF THESE

Answer

#ANSWER. C) USING ANOTHER COMANY TRADEMARK





Question 15. ANOTHER NAME FOR CLOSED SOFTWARE?
A) PUBLIC DOMAIN
B) OPEN SOURCE
C) PROPRIETORY
D) COPYLEFT

Answer

#ANSWER. C) PROPRIETORY





Question 16. WHAT IS GI?
A) GRAPHICAL INTERFACE
B) GLOBAL INTERCONNECTION
C) GEOGRAPHICAL INDICATION
D) GEOGRAPHICAL INTERFACE

Answer

#ANSWER. C) GEOGRAPHICAL INDICATION





Question 17. FIRST PROTECTION ACT WAS LAUNCED IN?
A) GESSE
B) FRANCE
C) UNITED STATES
D) HESSE

Answer

#ANSWER. D) HESSE





Question 18. FULL FORM OF GPL?
A) GENERAL PUBLIC LICENSES
B) GLOBAL PRIVATE LICENSES
C) GLOBAL PUBLIC LISCENSES
D) NONE OF THESE

Answer

#ANSWER. A) GENERAL PUBLIC LICENSES





Question 19. APACHE 2 IS EXAMPLE OF ?
A) COPYLEFT LICENSES
B) PEREMISSIVE LICENSES
C) SERVERS
D) AWS

Answer

#ANSWER. B) PERMISSIVE LICENSES





Question 20. EXAMPLE OF OPEN SOURCED FREE DISTRIBUTION SOFTWARE?
A) WINDOWS
B) GITHUB
C) APP STORE
D) NONE OF THESE

Answer

#ANSWER. B) GITHUB




Cyber ethics MCQ for class 10


Question 21. FULL FORM OF FSF?
A) FULL SOFTWARE FIRM
B) FREE SOFTWARE FOUNDATION
C) BOTH OF THESE
D) NONE OF THESE

Answer

#ANSWER.B) FREE SOFTWARE FOUNDATION





Question 22. RISE OF ICT RESULTS IN?
A) DIGITAL UNITE
B) DIGITAL GAP
C) DITGITAL DIVIDE
D) DATA EVALUATION

Answer

#ANSWER. C) DIGITAL DIVIDE





Question 23. FAMILY OF PERMISSIVE FREE SOFTWARE LECENSES?
A) BSD
B) BDT
C) APACHE
D) ALL OF THESE

Answer

#ANSWER. A) BSD





Question 24. UNETHICALLY USING INTERNET IS ?
A) PRIVACY
B) HACKING
C) FRAUD
D) BOTH B AND C

Answer

#ANSWER. D)





Question 25. IS ACCIDENTAL PLAGIARISM A CRIME
A) YES
B) NO
C) MAYBE
D) NONE OF THESE

Answer

#ANSWER. B) NO





Question 26. IDENTICATION IS DONE BY?
A) USERSAME
B) PASSWORD
C) BOTH OF THESE
D) NONE OF THESE

Answer

#ANSWER. A) USERNAME





Question 27. CITATION IS DONE FOR?
A) PARAPHRASING
B) AVAOID PLAGIARISM
C) BOTH OF THESE
D) FOR AWARENESS OF USER

Answer

#ANSWER. B) AVOID PLAGIARISM





Question 28. NOT NEXAMPLES OF ANTIVIRUS?
A) McAfee
B) FIREWALL
C) MS SECURITY ESSENTIALS
D) NONE OF THESE

Answer

#ANSWER. B) FIREWALL





Question 29. TROJAN HORSE IS A TYPES OF ?
A) MALWARE
B) KEYLOGGER
C) VIRUS
D) WORM

Answer

#ANSWER. A) MALWARE





Question 30. WHAT IS SELLING STAND ALONE SOFTWARES USUALLY COME WITH HARDWARES?
A) HARD DISK LOADING
B) OEM UNBUNDLING
C) COUNTERFEITING
D)ALL OF THESE

Answer

#ANSWER. B) OEM UNBUNDLING



Click the button to see more MCQ

error: Content is protected !!