MCQ on Cyber Ethics for class 10
Answers the following questions:
Question 1. What does not includes netiquettes?
a) use proper salutation
b)be respectful
c) disobey copyright laws
d) all of the above
Answer
#ANSWER. C) disobey copyright laws
Question 2. following are not types of fraud?
a) ambiguity
b) identity thept
c) hacking
d) none of the above
Answer
#ANSWER. d) none of the above
Question 3. tools used for shoulder surfing?
a) binoculars
b) vision enhancing devices
c) both a and b
d) none of these
Answer
#ANSWER. c) both a and b
Question 4. what is considered unfriendly return policy?
a) employment scam
b) phishing
c) as-is
d) all of these
Answer
#ANSWER. C) as-is
Question 5. Which of these not includes safeguarding your privacy?
a) people
b) pretexting
c) technology
d) none of these
Answer
#ANSWER. b) pretexting
Question 6. full form of GPS?
a) global positioning system
b) global patent system
c) both of these
d) none off these
Answer
#ANSWER. a) global positioning sytem
Question 7. what is softlifting?
a) unauthorized copies of product
b) malicious program
c) buying once and sharibng it with others
d) none of these
Answer
#ANSWER. c) buying once and sharing it with others
Question 8. plagiarism includes?
a) to steal new ideas
b) to commit literary thept
c) to use ideas without crediting
d) ALL of these
Answer
#ANSWER. D) ALL OF THESE
Question 9. what refers to spam?
a) sending bulk emails
b) sending email
c) sending malicious emails
d) all of above
Answer
#ANSWER. a) sending bulk emails
Question 10. keyloggers can be used in?
a) pc
b) cell phone
c) both of these
d) none of these
Answer
#ANSWER. C) BOTH OF THESE
Cyber ethics MCQ for class 10
Question 11. full form of TPS?
a) technical private service
b) transport protection service
c) technical protection service
d) none of these
Answer
#ANSWER. c) technical protection service
Question 12. what is cipher text?
a) plain text
b) encrypted keys
c) encrypted text
d) none of these
Answer
#ANSWER. C) ENCRYPTED TEXT
Question 13. FULL FORM OF PAP?
A) PRIVACY AUTHORIZATION PROTOCOL
B) PROTOCOL AUTHENTICATION PASSWORD
C) PASSWORD AUTHENTICATION PROTOCOL
D) NONE OF THESE
Answer
#ANSWER. C) PASSWORD AUTHENTICATION PROTOCOL
Question 14. WHAT IS A TRADEMARK INFRINGEMENTS?
A) USING TRADEMARKS
B) USING ANOTHER COMPANY TRADEMARK WITH CONSENT
C) USING ANOTHER COMPANY TRADEMARKS
D0 NONE OF THESE
Answer
#ANSWER. C) USING ANOTHER COMANY TRADEMARK
Question 15. ANOTHER NAME FOR CLOSED SOFTWARE?
A) PUBLIC DOMAIN
B) OPEN SOURCE
C) PROPRIETORY
D) COPYLEFT
Answer
#ANSWER. C) PROPRIETORY
Question 16. WHAT IS GI?
A) GRAPHICAL INTERFACE
B) GLOBAL INTERCONNECTION
C) GEOGRAPHICAL INDICATION
D) GEOGRAPHICAL INTERFACE
Answer
#ANSWER. C) GEOGRAPHICAL INDICATION
Question 17. FIRST PROTECTION ACT WAS LAUNCED IN?
A) GESSE
B) FRANCE
C) UNITED STATES
D) HESSE
Answer
#ANSWER. D) HESSE
Question 18. FULL FORM OF GPL?
A) GENERAL PUBLIC LICENSES
B) GLOBAL PRIVATE LICENSES
C) GLOBAL PUBLIC LISCENSES
D) NONE OF THESE
Answer
#ANSWER. A) GENERAL PUBLIC LICENSES
Question 19. APACHE 2 IS EXAMPLE OF ?
A) COPYLEFT LICENSES
B) PEREMISSIVE LICENSES
C) SERVERS
D) AWS
Answer
#ANSWER. B) PERMISSIVE LICENSES
Question 20. EXAMPLE OF OPEN SOURCED FREE DISTRIBUTION SOFTWARE?
A) WINDOWS
B) GITHUB
C) APP STORE
D) NONE OF THESE
Answer
#ANSWER. B) GITHUB
Cyber ethics MCQ for class 10
Question 21. FULL FORM OF FSF?
A) FULL SOFTWARE FIRM
B) FREE SOFTWARE FOUNDATION
C) BOTH OF THESE
D) NONE OF THESE
Answer
#ANSWER.B) FREE SOFTWARE FOUNDATION
Question 22. RISE OF ICT RESULTS IN?
A) DIGITAL UNITE
B) DIGITAL GAP
C) DITGITAL DIVIDE
D) DATA EVALUATION
Answer
#ANSWER. C) DIGITAL DIVIDE
Question 23. FAMILY OF PERMISSIVE FREE SOFTWARE LECENSES?
A) BSD
B) BDT
C) APACHE
D) ALL OF THESE
Answer
#ANSWER. A) BSD
Question 24. UNETHICALLY USING INTERNET IS ?
A) PRIVACY
B) HACKING
C) FRAUD
D) BOTH B AND C
Answer
#ANSWER. D)
Question 25. IS ACCIDENTAL PLAGIARISM A CRIME
A) YES
B) NO
C) MAYBE
D) NONE OF THESE
Answer
#ANSWER. B) NO
Question 26. IDENTICATION IS DONE BY?
A) USERSAME
B) PASSWORD
C) BOTH OF THESE
D) NONE OF THESE
Answer
#ANSWER. A) USERNAME
Question 27. CITATION IS DONE FOR?
A) PARAPHRASING
B) AVAOID PLAGIARISM
C) BOTH OF THESE
D) FOR AWARENESS OF USER
Answer
#ANSWER. B) AVOID PLAGIARISM
Question 28. NOT NEXAMPLES OF ANTIVIRUS?
A) McAfee
B) FIREWALL
C) MS SECURITY ESSENTIALS
D) NONE OF THESE
Answer
#ANSWER. B) FIREWALL
Question 29. TROJAN HORSE IS A TYPES OF ?
A) MALWARE
B) KEYLOGGER
C) VIRUS
D) WORM
Answer
#ANSWER. A) MALWARE
Question 30. WHAT IS SELLING STAND ALONE SOFTWARES USUALLY COME WITH HARDWARES?
A) HARD DISK LOADING
B) OEM UNBUNDLING
C) COUNTERFEITING
D)ALL OF THESE
Answer
#ANSWER. B) OEM UNBUNDLING