Page 1 :
; ultiple Choice Questions, , Multit, ) =, , “4, Ecommerce stands for:, (a) Electronic Commerce (B) Electronic Commodity, Electronic Control (D) Electric Commerce, 2. C2C means ?, (A) tenets to Consumer (B) Commodity to Consumer, (C) Commodity to Consumer (D) Computer to Consumer, checks all the movement of networks., (A) SSL (B) IDs, (c) SSH ; . (D) None of the above, fe the uneven distribution of information and communication., (A) Digital Property Rights (B) Digital Divide, , (C) Digital Literacy {D) None of the above, i —— is a technique through which confidential data needs to be transferred over the secured, , chann, , (A) Cryptography (B) Encryption, , {C) Decryption (D) All of the above, , 6 Assertion-Reasoning Type, , 6. Assertion (A): Fraud means purposefully misrepresenting the facts to deceive another person for, personal gains., Reason(R): In e-commerce the credit card information at times hacked for personal gains., (A) Both A and R are true, and R is the correct explanation of A. :, (B) Both Aand Rare true, but R is not the correct explanation of A., (C) Ais true but R is false., (D) Ais false but R is true., (E) Both A and Rare false., , 1. Assertion (A): Authentication is the basis of access contro, which identity of individual is verified., Reason(R): Username and Password are commonly used to check the identity and authenticity of, an individual., (A) Both A and R are true,, (B) Both A and Rare true, but Ris no, (C) Ais true but R is false., (0) Ais false but R is true., , (©) Both A and R are false., © Assertion (A): Ordered list is also called as Numbered list., , Reason(R): Start and ‘Type are the two attributes of Ordered list., (A) Both A and Rare true, and Ris the correct explanation of A., (8) Both Aand Rare true, but R is not the correct explanation of A., , (C) Ais true but R is false., but Ris true., , {D) Ais fa 4, } Sey Sie oe are false., , 1 which is important for securing data in, , and Ris the correct explanation of A., t the correct explanation of A.
Page 2 :
0 = (A): Closed Software are exclusively controlled and modified by the original creator, ~~, , Reason(R): Anyone can have the access of the source code of closed software., (A) Both A and Rare true, and R is the correct explanation of A., (8) BothA and R are true, but R is not the correct explanation of A., (C) Ais true but R is false., (D) Ais false but Ris true., (E) Both Aand Rare false., , 40. Assertion (A): The digital gap between the people who extensively used internet and who, , 7 have not, access to internet is increasing day by day due to rose if ICT., Reason(R): There are still many rural areas where there is no internet connection available to the, people., , (A) Both A and Rare true, and R is the correct explanation of A., , (B) Both A and Rare true, but R is not the correct explanation of A., (C) Ais true but R is false. Pn, , (D) Ais false but R is true., (E) Both A and R are false., , @ Case/Source Based Type, , » Ethics is a collection of moral principles that differentiates between the goods and bad practices,, Computer ethics involves the code of conduct to use information technology in a responsible way., There are many types of ethical issues and Plagiarism is one of them. Plagiarism is using someone else's, ideas, words, work, production, ideas and research without the approval or the acknowledgement, of the writer or producer and claiming that as one's original work. Common types of Plagiarism, are Direct, Mosaic, Self-Plagiarism and Accidental Plagiarism. In self plagiarism the author shares, the same content in different context without citing that it was used earlier. In direct plagiarism the, original work is copied from word to word and represented as own work. In mosaic plagiarism the, only the words are replaced with synonyms, but the structure of the sentence remains the same. In, Accidental plagiarism the user doesn’t know to quote, cite the research properly. The plagiarism can, be avoided by giving the proper citing or acknowledgement to the original creator, The children, should mention the source of information while using the matter pasted from internet. One should, understand the concept, then pen down that in his or her own language as per understanding of the, topic. This way people can prevent themselves from this criminal offence., , 11. The sentence structure remains the same in the form of Plagiarism., (A) Accidental (B) Direct, (C) Mosaic (D) None of the above, 12. To steal and pass off the ideas and words of another as one’s own is known as:, (A) Intellectual property rights (B) Plagiarism, (C) Copyright (D) Piracy, 13. The moral principles that differentiate between the goods and bad practices are known as:, (A) Cyber Ethics (B) Ethics, (C) Netiquettes (D) None of the above ., 14, The code of conduct that describes the responsible way to conduct oneself while using Information, ‘Technology is called as:, (A) Cyber Ethics (B) Cyber laws, (C) Ethics, , (D) All of the above, , Which ways can be used to prevent oneself to become the victim of Plagiarism?, (A) Citing, , (B) Source information, , (C) Reframing in own language by understanding concepts, , Scann@DwAll oftheabeve;, , 15.