0% found this document useful (0 votes)
42 views4 pages

CL12-IP-Case Study Based Questions

Uploaded by

juliusjuan142
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
42 views4 pages

CL12-IP-Case Study Based Questions

Uploaded by

juliusjuan142
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

Smridh has recently changed his school so he is not aware of the people, but someone is posting

negative , demeaning comments on his social media profile. He is also getting repeated mails
from unknown people. Everytime he goes online, he finds someone chasing him online.

i. Smridh is a victim of …………. :


a. Eavesdropping
b. Stolen identity
c. Phishing
d. Cyber stalking

ii. The action that Smridh should take :


a. He should ONLY share with his friends
b. He should NOT share with anyone as it can cause serious problem
c. He should immediately report to the police
d. He should bring to the notice of his parents and school authorities.

iii. …………………….. is a set of moral principles that governs the behaviour of a group or
individual and regulates the use of computers.
a. Copyright
b. Computer ethics
c. Property rights
d. Privacy law

iv. Smridh needs to protect his personal information or data from unintentional and intentional
attacks and disclosure which is termed as ………...
a. Digital right
b. Copyright
c. Privacy
d. Intellectual property

v. The act of fraudulently acquiring someone’s personal and private information, such as online
account names, login information and passwords is called as ……………
a. Phishing
b. Fraud
c. Scam
d. Plagiarism

The school offers Wi-Fi to the students of Class XII. For communication, the network security-
staff of the school is having a registered URL "schoolwifi.edu". On 17th September 2017,
emails were received by all the students regarding expiry of their passwords. Instructions were
also given renew their password within 24 hours by clicking on particular URL provided.
On the bases of the above case study, answer the questions given below:

1
i. Specify which type of cybercrime is it.
a) Spamming
b) Phishing
c) Identity Theft
d) Hacking
ii. URL stands for____________

iii. Unsolicited commercial email is known as:


a) Malware
b) Virus
c) Spam
d) Spyware

iv. WiFi stands for ___________

v. Ideally, what characters should be used in a password to make it strong?


a) Letters and numbers only
b) Mixed Case (Upper and Lower)
c) Special characters
d) All of above

Vidya Devi, a retired school principal, was inspired by her granddaughter who uses technology
for her day to day activities. Being a learner and teacher all her life, she wanted to open an email
account and interact with her friends and family. Her granddaughter created an email account for
her and gradually she started sending mails to her friends and family. This was a big achievement
for her. Her granddaughter explained how emails are sent, how to create an email address, what
protocols are used. Some of these details were too technical for her, but she never gave up. There
are few doubts/misconceptions in her mind which you can help her with.

i. Unsolicited e-mail advertising is known as


a. newsgroup
b. junk ads
c. spam
d. none of the above

ii. Which of the following is the correct format of email address?


a. name@website@info
b. [email protected]
c. www.nameofwebsite.com
d. name.website.com

iii. Mail access starts with client when user needs to download email from the
a. mail box
b. mail server

2
c. IP server
d. Internet
iv. To use email service, one needs to register with
a. Internet Service Provider
b. Email Service Provider
c. A company
d. No need to register

v. Bcc stands for to send the copy of mail.


a. Black carbon copy
b. Blue carbon copy
c. Blind carbon copy
d. Block chain copy

Ramanpreet has to work on his science project which deals with electromagnetic waves. A lot of
research workis required by him for the same. He uses Google Chrome to search for the relevant
matter.
a. Website
b. Web browser
c. Web Page
d. Web Page

ii. He finally locates some useful information and clicks on the link provided to access the
website. The link is actually known as a_____________.
a. Domain name
b. Web Page
c. URL
d. IP address

iii. As Ramanpreet works on his project, he collects and curates information. Whenever he clicks
on the link the same piece of information is shown and the content is not clickable. Ramanpreet
is accessing a/an _______ website.
a. Dynamic
b. Textual
c. Outdated
d. Static

iv. A web cookie is a small piece of data that is __________


a. sent from a website and stored in user’s web browser while a user is browsing a website
b. sent from user and stored in the server while a user is browsing a website
c. sent from root server to all servers
d. sent from the root server to other root servers

v. HTML stands for________


3
Sumit has to prepare a project on “Swachh Bharat Shreshth Bharat”.
He decides to get information from the Internet. He downloads three web pages (webpage1,
webpage 2, webpage 3) containing information on the given topic.
1. He read a paragraph on from webpage 1 and rephrased it in his own words. He finally pasted
the rephrased paragraph in his project.
2. He downloaded three images of from webpage 2. He made a collage for his project using these
images.
3. He also downloaded an icon from web page 3 and pasted it on the front page of his project
report.

i. Step1 An Example of __________


a. Plagiarism
b. Paraphrasing
c. copyright infringement
d. Intellectual Property right

ii. Step 2 An act of __________


a. plagiarism
b. copyright infringement
c. Intellectual Property right
d. Digital Footprints

iii. Step 3 An act of _________


a. Plagiarism
b. Paraphrasing
c. copyright infringement
d. Intellectual Property right

iv. A website is a collection of ___________


a. Web Servers
b. Web pages
c. Browsers
d. Hyperlinks

v. The process of getting web pages, images and files from a web server to local computer is
called ______
a. FTP
b. Uploading
c. Downloading
d. Remote access

You might also like