CBSE Class 10 Computer Application code 165 Unit 3 Cyber Ethics MCQ’s Set – 3

Class 10 Computer Application [165]

Unit 3: Cyber Ethics



Multiple Choice Questions – Cyber Ethics Set – 3

41. To ensure that the site is a safe site, you must check ___________.

a. https protocol

b. padlock

c. Both a and b

d. None of these

Answer: c. Both a and b

42. Fraud committed using the Internet is called ___________.

a. online fraud

b. cyber crime

c. hacking

d. None of these

Answer: a. Online Fraud

43. Identify which of the following is not an Online Fraud?

a. Non-delivered goods

b. Stealing information

c. Fraudulent payments

d. Not received OTP

Answer: d. Not received OTP

44. Identify which of the following is an Online Fraud?

a. Non-existent companies

b. Purchased of Items on Amazon.com

c. Delivery of Goods

d. None of these

Answer: a. Non-existent companies

45. Credit Card frauds is an example of _____________.

a. Stealing information

b. Fraudulent payments

c. Both a and b

d. None of these

Answer: c. Fraudulent payments

46. In ___________ fraud, the credit card details of user are stolen from his / her online activities and then some payment frauds are carried out with this stolen information.

a. Identity theft

b. Credit card frauds

c. Plagiarism

d. None of these

Answer: b. Credit card frauds

47. Stealing someone else’s online identity, fraudulent posts, or some other malicious activity is carried out, is called _________.

a. Identity theft

b. Credit card frauds

c. Plagiarism

d. None of these

Answer: a. Identity theft

48. Fraudulent posts are posted on social media handle, email-id , etc. is known as ________.

a. Identity theft

b. Credit card frauds

c. Plagiarism

d. None of these

Answer: a. Identity theft

49. While providing your personal details or bank details on any web site, you must ensure that ___________.

a. Type the URL in the address bar

b. Do not click on a link

c. Do not cut/copy the link

d. All of these

Answer: d. All of these

50. By URL, Identify which site is not a secured web site.

a. https://mycstutorial.in/

b. https://www.anjeevsinghacademy.com

c. http://www.btechgyan.com

d. https://www.onlinesbi.com

Answer: c. http://www.btechgyan.com

51. Identify the image of closed padlock, which display with the secured web site .

a.

Black Lock Icon PNG Transparent Background, Free Download #29059 -  FreeIconsPNG

b.

Orange lock 2 icon - Free orange lock icons

c.

Lock Icon Png Black Download - Padlock Icon PNG Image | Transparent PNG  Free Download on SeekPNG

d. None of these

Answer: a.

Black Lock Icon PNG Transparent Background, Free Download #29059 -  FreeIconsPNG

52. __________ means applying enough technical safeguards so that data travels safely to its target, without being compromised or eavesdropped.

a. Data Transmission

b. Secure Data Transmission

c. Secure Transmission

d. None of these

Answer: b. Secure Data Transmission

53. __________ is a standard security protocol which establishes encrypted links between a web server and a browser in an online communication.

a. https

b. ftps

c. ssl

d. pop

Answer: c. ssl

54. SSL stands for __________ .

a. Session Secured Level

b. Secure Sockets Layer

c. Secure Session Layer

d. Session Security Level

Answer: b. Secure Sockets Layer

55. __________ technology ensures that all data transmitted between a web server and a browser remains encrypted and hence remains safe.

a. HTTPS

b. FTP

c. SSL

d. TELNET

Answer: c. SSL

56. To ensure secure data transmission, _____________ techniques are applied.

a. SSL Secure data transmission

b. Data Encryption

c. Use of Safe Protocols

d. All of these

Answer: d. All of these

57. SSH stands for _____________.

a. Secure Shell

b. Safety Shell

c. Secure Socket Hypertext

d. None of these

Answer: a. Secure Shell

58. _______ data when sent over Internet is hard to steal and hence is safer.

a. Encrypted

b. Decrypted

c. Personal

d. None of these

Answer: a. Encrypted

59. _______ will ensure the safety of data being transferred over the insecure network like Internet.

a. FTPs

b. HTTP

c. SSH

d. None of these

Answer: c. SSH

60. _______ will be use as safe protocols to transfer files.

a. Secure FTP

b. HTTPS

c. SSH

d. None of these

Answer: a. Secure FTP


Class 10 Computer Application [165] Cyber Ethics MCQ’s


Class 10 Computer Application [165] HTML – I MCQ’s


You cannot copy content of this page

Table of Contents
Scroll to Top