Multiple Choice Questions
Question 1
The term IPR stands for:
- Intellectual Property Rights
- Intellectual Performance Rights
- Individual Property Rights
- Individual Performance Rights
Answer
Intellectual Property Rights
Reason — The term IPR stands for Intellectual Property Rights.
Question 2
IPR applies to:
- Trademarks
- Patents
- Copyrights
- All of these
Answer
All of these
Reason — The common types of Intellectual Property Rights are trademark, patent, and copyright.
Question 3
Privacy of data can be breached by disclosing information pertaining to:
- Personal details
- Healthcare records
- Criminal justice investigations
- All of these
Answer
All of these
Reason — Privacy of data can be breached by disclosing information pertaining to personal details, healthcare records, financial transactions or status, criminal justice investigations and proceedings or business and commercial transactions.
Question 4
Which of the following is not a form of software piracy?
- Softlifting
- Counterfeiting
- Hard Disk Loading
- Encrypting
Answer
Encrypting
Reason — Encrypting is not a form of software piracy.
Question 5
The right to decide how much personal information you want to communicate with others is known as:
- Copyright
- Trademark
- Privacy
- Information Security
Answer
Privacy
Reason — Privacy is the right to control what happens with your personal information.
Question 6
The unsolicited emails and attractive advertisements are collectively known as:
- Spam
- Virus
- Hacking
- Patent
Answer
Spam
Reason — The unsolicited emails and attractive advertisements are collectively known as spam.
Question 7
The right which is concerned with the design and algorithm of the product rather than the entire product is called:
- Copyright
- Patent
- Trademark
- Data Protection Law
Answer
Patent
Reason — The right which is concerned with the design and algorithm of the product rather than the entire product is called patent.
Question 8
Hacking a web server or taking control of another person's website is called:
- Web Hiking
- Web Hijacking
- Web Crawling
- Web Cracking
Answer
Web Hijacking
Reason — Hacking a web server or taking control of another person's website is called web hijacking.
Question 9
Which one of the following is a cyber crime?
- Cyberstalking
- Cyberespionage
- Cyberwarfare
- All of these
Answer
All of these
Reason — Cyberstalking, cyberespionage and cyberwarfare are cyber crimes.
Question 10
............... involves an attack coupled with a demand for money to stop further attacks.
- Cyberstalking
- Cyberespionage
- Cyber Extortion
- Cyberwarfare
Answer
Cyber Extortion
Reason — Cyber Extortion involves an attack coupled with a demand for money to stop further attacks.
Question 11
Pick the cybercrime in which the attacker harasses a victim by using the electronic communication.
- Cyberstalking
- Cyber Extortion
- Cyberespionage
- Cyberwarfare
Answer
Cyberstalking
Reason — Cyberstalking is a crime in which the attacker harasses a victim by using electronic communication, such as an e-mail, instant messaging, or messages posted to a website or a discussion group.
Assignment Questions
Question 1
Explain what are computer ethics?
Answer
Computer ethics involves the code of conduct to use Information Technology in a responsible way. It fulfils the requirements of an individual user without manipulating or destroying the data of any other user. Therefore, all the computer users must follow computer ethics.
Question 2
What are the major ethical issues in the field of computing?
Answer
The major ethical issues in the field of computing are as follows:
- Data privacy
- Spam
- Software Piracy
- Cybercrimes
- Hacking
Question 3
What is hacking? How does it harm a computer and an organisation?
Answer
Hacking refers to an illegal intrusion into a computer system or network.
Hacking leads to breaking passwords, stealing valuable data, installing viruses, encrypting computer hard disks and demanding ransom money. If someone hacks an organization, that individual can steal sensitive data such as documentation of business processes and trade secrets or contact information for employees and customers.
Question 4
What are ethical hackers? What do they do?
Answer
The people who are involved in hacking activities with the goal of improving security are known as ethical hackers. They use ethical hacking for a good cause such as national security or to stop crimes and fraud.
Question 5
Why should we control software piracy?
Answer
We should control software piracy because of the following reasons:
- It is unethical.
- It costs government, businesses and individuals a lot of money.
- It increases the chances of cybersecurity attacks.
- It makes businesses less productive.
Question 6
What are spams? How do they affect our life?
Answer
Spams are unwanted bulk emails that come from unsolicited sources.
Spam is a serious security concern as it can be used to deliver Trojan Horses, Viruses, Worms, Spyware, and organise targeted phishing attacks. Sometimes, spam attackers keep sending bulk emails till the email server is out of disk space.
Question 7
Describe various types of cyber crimes prevalent these days.
Answer
Cyber crimes can be broadly classified into the following categories:
- Cyberstalking — It is a crime in which the attacker harasses a victim by using electronic communication, such as an e-mail, instant messaging, or messages posted to a website or a discussion group.
- Cyberbullying — It is an act of harming or harassing using information technology in a deliberate manner.
- Cyberespionage — It is the practice of using information technology to obtain secret information without permission from its owners or holders.
- Cyberwarfare — It involves the use of information technology by a nation to penetrate another nation's networks to cause damage or disruption.
- Cyberterrorism — Cyberterrorism is the act of conducting terrorism through the use of computers and the internet in order to cause fear and panic.
- Cyber Extortion — It is a crime that involves an attack coupled with a demand for money to stop further attacks.
- Sexting — Sexting means sending or forwarding exposed, sexual material to others without taking their consent.
Question 8
What Netiquettes do you need to follow when using a social networking site like Twitter?
Answer
We should use the following netiquettes while using a social networking site:
- Avoid using inflammatory or offensive language, and respect other people's opinions, even if you disagree with them.
- Avoid sarcasm as the other person may misinterpret it.
- Avoid the overuse of emoticons.
- Do not spam and and do not use automated scripts or bots to post repetitive content.
- Avoid the overuse of hashtags as it can make the posts difficult to read.
- Respect privacy.
- Respect everyone's cultures and diversity.
- Never write the entire message in capital letters.