You are on page 1of 1

Question on Society, Law and Ethics

1) Define the following with examples wherever possible:


a. Online Fraud
b. Intellectual property right
c. Plagiarism
d. Digital property
e. Phishing
f. Scam
g. Computer forensics
h. Identity theft
i. Cyber-crime, Cyber-bullying, Cyber-Stalking
j. Smart mob
k. Net Neutrality
2) Compare and contrast:
a. Free S/w and Open Source S/w
b. Freeware and Free S/w
c. Freeware and Shareware
d. Proprietary S/w and Free S/w
e. OSS , FOSS and FLOSS
3) Expand the terms:
OSI, FLOSS, GNU, W3C, WEEE, FSF, LGPL, SDLC, IAD, SSL, HTTPS, ISP, ICT
4) Give example of Freeware, Free S/w, Shareware, Open Source S/w, Proprietary S/w [Search on Internet]
5) What are the different threats associated with “digital properties”? What measures can be ensured to protect “digital properties”?
6) What are the different kinds of freedom associated with free software?
7) How can you ensure the secure data transmission?
8) Why Internet is called as “Echo Chamber”? What is/are the disadvantages of “Internet echo effect” in society?
9) What are the Gender and Disability issues faced while teaching/using computers in the class-rooms? Give example of S/w and H/w that
may be used for special needs students.
10) How plagiarism can be avoided while referring to someone else’s creation?
11) Name some common public domain s/w licenses. How GPL is different from LGPL S/w licenses?
12) Give some example of crime which is not cybercrime. What is “Bitcoin”?
13) What measures can be taken by an ISP to prevent or avoid “Net Neutrality”?
14) What are the different impacts (economic, socio) of ICT in the society? Name some benefits from e-Waste Recycling.
15) Which of the following is not an intellectual property? (i) A poem written by a poet (ii) An original painting made by a painter (iii)
Trademark of a Company (iv) A remixed song
16) WEEE also known as (1) Electronic waste, (2) e-Waste, (3) e-scrap, (4) all options are correct
17) Jhilmil has stolen a credit card. She used that credit card to purchase a laptop. What type of offence has she committed?
18) Name the primary law in India dealing with cybercrime and electronic commerce. What is “Digital Signature”?
19) Sunanda received an email from her bank stating that there is a problem with her account. The email provides instructions and a link, by
clicking on which she can logon to her account and fix the problem. Help Sunanda by telling her the precautions she should take when she
receives these types of emails.
20) Explain any two ways in which technology can help students with disabilities.
21) Explain the role of online social media campaigns, crowdsourcing and smart mobs in society [3-mark question]
22) Mr. Samanta has many electronics gadgets which are not usable due to outdated hardware and software. Help him to find any three best
ways to dispose the used electronic gadgets. [3-mark question]
23) Posing as someone else online and using his/her personal/financial information shopping online or posting something is a common type of
cyber-crime:
a. What kind of crime it is?
b. What measures can you take to stop this?
24) Mr. Jayanto Das is confused between Shareware and Open Source S/w. Mention at least to pints of differences to help him understand the
same.
25) As a citizen of India, what advise you should give to others for e-waste disposal?
26) What can be done to reduce the risk of identity theft? Write any two ways.
27) Enumerate any two disability issues while teaching and using computers
28) Differentiate between open source and open data.
29) Ravi received a mail form IRS department (as shown above). On clicking “Click Here”, he was taken to a site designed to imitate an
official-looking website, such as IRS.gov. He uploaded some important information on it.
Identify and explain the cybercrime being discussed in the above scenario.
30) Write 3 ways by which a person can be authenticated. List any two ways of network security. Name two crimes where cyber law enforced.

You might also like