हिंदी

After a fight with your friend, you did the following activities. Which of these activities is not an example of cyber bullying? - Computer Science (Python)

Advertisements
Advertisements

प्रश्न

After a fight with your friend, you did the following activities. Which of these activities is not an example of cyber bullying?

विकल्प

  • You sent an email to your friend with a message saying that “I am sorry”.

  • You sent a threatening message to your friend saying “Do not try to call or talk to me”.

  • You created an embarrassing picture of your friend and uploaded on your account on a social networking site.

  • None of the above

MCQ
Advertisements

उत्तर

You sent an email to your friend with a message saying that “I am sorry”.

Explanation:

A sort of bullying or harassment that uses technology is known as cyber bullying or cyber harassment. Online bullying also includes cyber bullying and cyber harassment.

shaalaa.com
  क्या इस प्रश्न या उत्तर में कोई त्रुटि है?
अध्याय 11: Societal Impact - Exercise [पृष्ठ २४६]

APPEARS IN

एनसीईआरटी Computer Science [English] Class 11
अध्याय 11 Societal Impact
Exercise | Q 4. | पृष्ठ २४६

संबंधित प्रश्न

After practicals, Atharv left the computer laboratory but forgot to sign off from his email account. Later, his classmate Revaan started using the same computer. He is now logged in as Atharv. He sends inflammatory email messages to few of his classmates using Atharvs email account. Revaans activity is an example of which of the following cybercrime? Justify your answer.


In ethical hacking and cyber security, there are ______ types of scanning.  


A research student is expected to write a thesis on a topic. The student browses the Internet for the topic and luckily finds it on the Internet. He copies and submits the entire thesis as his own research work. Which of the following activities appropriately categorizes the act of the writer?


Which of the following crime(s) is/are covered under cybercrime?

  1. Stealing a brand new hard disk from a shop.
  2. Get into an unknown person's social networking account and start messaging on his behalf.
  3. Copying some important data from a computer without taking permission from the owner of the data.
  4. Working on someone's computer with his/her permission.

Identify the type of cybercrime for the following situations: A person complains that his/her debit/credit card is safe with him still somebody has done a shopping/ATM transaction on this card.


______ is a term used to describe the legal issues related to using of communications technology, particularly "cyberspace", i.e. the Internet.


Rishika found a crumpled paper under her desk. She picked it up and opened it. It contained some text which was struck off thrice. But she could still figure out easily that the struck-off text was the email ID and password of Garvit, her classmate. What is ethically correct for Rishika to do?


How would you recognize if one of your friends is being cyberbullied?

Cite the online activities which would help you detect that your friend is being cyberbullied.


List down the steps you need to take in order to ensure -

your computer is in good working condition for a longer time.


Nadar has recently shifted to a new city and school. She does not know many people in her new city and school. But all of a sudden, someone is posting negative, demeaning comments on her social networking profile, etc.

She is also getting repeated mails from unknown people. Every time she goes online, she finds someone chasing her online.

  1. What is this happening to Nadar?
  2. What immediate action should she take to handle it?
  3. Is there any law in India to handle such issues? Discuss briefly.

Share
Notifications

Englishहिंदीमराठी


      Forgot password?
Use app×