Please refer to the following Cyber Safety Class 11 Computer Science MCQ Questions. These multiple choice questions have been prepared based on the latest examination pattern, NCERT book and syllabus issued by CBSE, NCERT and KVS. Students should go through all MCQ Questions for Class 11 Computer Science with answers as they will help them to prepare for the exams.
Cyber Safety Class 11 Computer Science MCQ Questions
Question: Shreya told her friend Princy about a term that, “It is the study of ethics pertaining to computers, encompassing user behaviour and what computers are programmed to and how this affects individuals and society”. What is it?
(a) Cyber ethics
Question: Charlene is an artist. She displays her artwork on the Internet using her website to attract buyers. One day while browsing the Internet she discovers that another artist has displayed her painting portraying it as his own. Which rights of Charlene was infringed?
(a) Digital Privacy Rights
(b) Intellectual Property Rights
(c) Digital Property Rights
(d) Intellectual Privacy Rights
Question: Which of the following refers to attempt to gain information from undisclosed areas?
Question: ……… footprints which include data that we intentionally submit online.
(a) Active digital
(b) Passive digital
(c) Both (a) and (b)
(d) None of these
Question: Rahul is working in MNC company. His friend told him about a term that it encourages people to create new softwares as well as helps them to improve the existing application. Identify that term.
(c) Intellectual property rights
Question: Suhana is down with fever. So, she decided not to go to school tomorrow. Next day, in the evening she called up her classmate, Shaurya and enquired about the computer class. She also requested him to explain the concept. Shaurya said, “Mam taught us how to use tuples in Python”. Further, he generously said, “Give me some time; I will E-mail you the material which will help you to understand tuples in Python”.
Shaurya quickly downloaded a 2-minute clip from the Internet explaining the concept of tuples in Python. Using video editor, he added the text “Prepared by Shaurya” in the downloaded video clip. Then, he emailed the modified video clip to Suhana. This act of Shaurya is an example of
(a) fair use
(c) copyright infringement
Question: Rishika found a crumpled paper under her desk.
She picked it up and opened it. It contained some text which was struck off thrice. But she could still figure out easily that the struck off text was the E-mail ID and password of Garvit, her classmate.
What is ethically correct for Rishika to do?
(a) Inform Garvit so that he may change his password.
(b) Give the password of Garvit’s E-mail ID to all other classmates.
(c) Use Garvit’s password to access his account.
Question: Self- repeating and do not require a computer program to attach themselves
Question: A type of computer crime used to attack, steal user data, including login name, password and credit card numbers.
(c) Man-in-the-middle attack
Question: After practicals, Atharv left the computer laboratory but forgot to sign off from his E-mail account.
Later, his classmate Revaan started using the same computer. He is now logged in as Atharv. He sends inflammatory E-mail messages to few of his classmates using Atharv’s E-mail account.
Revaan’s activity is an example of which of the following cybercrime?
(b) Identity theft
(c) Cyber bullying
Question: Adware are pre-chosen ……… developed to display ads.
Question: An attempt to harm, damage or cause threat to a system or network is broadly termed as
(b) cyber attack
(c) cyber law
(d) digital crime
Question: What is legal form of hacking known as?
(c) Non-ethical hacking
(d) Ethical hacking
Question: Firewall examines each ……… that are entering or leaving the Internal network.
(a) E-mails user
(d) data packets
Question: They are hackers and their main motive is to gain financial profit by doing cyber crimes. Who are “they” referred to here?
(a) White hat hackers
(b) Black hat hackers
(d) Gray hat hackers
Question: ………… is the kind of firewall is connected between the device and the network connecting to Internet.
(a) Hardware firewall
(b) Software firewall
(c) Stateful inspection firewall
(d) Microsoft firewall
Question: What is cyber security?
(a) Provides security against malware
(b) Provides security against cyber-terrorists
(c) Protects a system from cyber attacks
(d) All of the above
Question: A software that can be freely accessed and modified.
(a) Synchronous software
(b) Package software
Question: Which of these is not an example of cyber bullying?
(a) Copying a classmate’s personal photo against his/her permission from his social media account and sending it to other friends on their E-mails.
(b) Bullying a classmate in the school corridor.
(c) Threatening someone on Whatsapp.
(d) Posting mean messages about someone on their social media.
Question: Which of the following is not an open source software?
(b) Microsoft Office
(c) GNU image manipulation
Question: The user must agree to the ………… terms and agreements when they use an open source software.
Question: Which of the following element make E-Waste hazardous in nature?
Question: Arun clicks on a link received in a message on his phone which promises him a complimentary trip to a destination of his choice. He forwarded this message to his friend, Panshul and asked him to do the same. But Panshul refuses and tells Arun that his personal and private information, such as online account names, login information and passwords can be stolen and he should be careful of such …………… attacks.
Case Based MCQs
Question: Geetika has recently created her social accounts.
She is very excited as she waited so long to go online. She has recently also got admission in a prestigious high school and does not know many students.
When she logs into her social media a few days later, she finds that someone is posting negative, demeaning comments on her social media profile.
She is also getting repeated mails from unknown people. Whenever she goes online, she is trolled by multiple unknown people.
Based on the given information, answer the following questions.
Question: Which of the following is the most appropriate action she should take?
(a) She should stop going online and delete her social media accounts.
(b) She should not share this with anyone as she might face more of such kind of behaviour.
(c) She should file a complaint at the nearest police station.
(d) She should inform her parents and bring to the notice of school authorities.
Question: Geetika is a victim of
(d) cyber stalking
Question: Geetika is advised by her best friend, Seerat to protect her personal information from intentional or unintentional attacks by others. This is also known as …………… .
(a) digital right
(c) data privacy
(d) intellectual property
Question: After hearing her ordeal, the school decides to publish a set of moral principles that determines the appropriate behaviour of students while using the Internet. The school is referring to…………… .
(a) intellectual property rights
(b) internet privacy
(c) computer ethics
(d) cyber ethics
Question: The computer teacher of Geetika’s class decides to take an online session on the topic Netiquettes, which generally includes
(a) safeguarding one’s passwords and sensitive online information
(b) logging out of social media accounts after the session
(c) not bullying or trolling anyone by disrespecting them or passing inappropriate remarks
(d) All of the above