You are on page 1of 3

Cyberethics

Case Study 1
Secure data transmission
Secure data transmission means that data/information is not being received or modified by
an unauthorized person, over a network, from source to destination. For secure data
transmission, we can convert an actual message (which is in readable form) into an
unreadable message (called an encrypted message) with the help of the concept of
encryption. This unreadable message is sent through the network to the destination. If a
hacker tries to read this message, he/she receives an unreadable message that cannot be
easily converted into the actual message. The unreadable message can be converted to the
original message by the receiver at the destination. Caesar Cipher is one of the common
encryption techniques. In this technique, each letter of the word is replaced by a letter some
fixed number of positions (usually called as key) down the alphabet. For example, if the key
is 3, each 'A' will be replaced by 'D' (Letter 'D' is 3 positions down Letter 'A' in the alphabet),
each 'B' will be replaced by 'E' and similarly, each 'Z' will be replaced by 'C'. The receiver
can identify the original message by using the reverse technique of encryption. This reverse
technique is called decryption.

1.Secure data transmission means

a) Data can be accessed by any unauthorized person during transmission.

b) Data can not be accessed by any unauthorized person during transmission.

c) Transmission of data

d) None of the above

2. Which of the following techniques can be used for security of data.

a) Authentication

b) Authorisation

c) Encryption

d) All of the Above

3. Caesar Cipher is

a) used for conversion of the actual message into an encrypted message

b) an encryption technique

c) both (a) and (b)

d) None of the above

4. Person 'X' has received an encrypted message and wants to convert this message into
the actual message (message before encryption). The technique he should use is called
a) Conversion

b) Encryption

c) Decryption

d) None of the above

5. A sender wants to send a message having the text as 'COMPUTER' to a receiver using 4
as the key. What will be the encrypted message?

a) GSQTZXIV

b) GSQTYXIV

c) GSXTYXIV

d) GSQSYXIV
6. An encryption algorithm is used to transform a readable message into:

a) Text message

b) Simple message

c) Converted message

d) Encrypted message

7. In Ceaser Cipher, for which of the following values of key, the encrypted message will be
the same as original message.

a) 0

b) 26

c) both (a) and (b)

d) None of the above

Case Study 2
Plagiarism
Plagiarism means to copy the somebody’s work and present it as your own, without
acknowledging the owner’s efforts. It could be done with or without a consent of the owner. It
is an unethical act but cannot be called a crime. Thus it can be punishable as it involves
violation of the moral rights.

Some common types of plagiarism are Direct plagiarism, self plagiarism, mosaic plagiarism,
accidental plagiarism etc.

When you copy and paste a part of text without giving a credit to the author, it is referred to
as direct or copy-paste plagiarism.

In Para phrasing, though some changes are done in the text while copying, but the idea
conveyed remains the same.
Sometimes, we even trend to plagiarize our own work, by submitting a previously used work
for a new project. This is called self plagiarism.

To avoid plagiarism, always cite all the resources and keep a record of the sources reffered
to, in your work. Properly quote the content and add your own ideas wherever possible. Use
a plagiarism before submitting your work.

1. Plagiarism is defined as …………


a. Copying somebody’s work and presenting it as your own creation
b. Buying somebody’s work online
c. Citing different sources of your work
d. None of the above
2. Which of the following is not an example of a copy-paste plagiarism?
a. Taking paragraph from a book
b. Directly picking up content from the internet
c. Using a cheat site to find content
d. Pick up content and make changes before using
3. Why should we cite all the sources?
a. To make everyone aware that we have referred to multiple source
b. To give proof of your logics and to avoid unethical use of resources
c. To take all the credit
d. None of the above
4. Smantha resubmitted her own project in XYZ course that she had submitted earlier
for PQR course under the guidance of Mr. Prabhu. Which kind of a plagiarism is
being referred to in this example?
a. Mosaic
b. Direct
c. Self
d. Paraphrasing
5. Which type of plagiarism involves copying data with minor changes, keeping the idea
and intention of the source intact?
a. Paraphrasing
b. Copy paste
c. Mosaic
d. Self
6. Which of the following can be done to avoid plagiarism?
a. Always cite all the resources
b. Properly quote the content
c. Use a plagiarism checker before submitting your work
d. All of the above

You might also like