Advertisements
Advertisements
Question
Rishika found a crumpled paper under her desk. She picked it up and opened it. It contained some text which was struck off thrice. But she could still figure out easily that the struck-off text was the email ID and password of Garvit, her classmate. What is ethically correct for Rishika to do?
Options
Inform Garvit so that he may change his password.
Give the password of Garvit’s email ID to all other classmates.
Use Garvit’s password to access his account.
Advertisements
Solution
Inform Garvit so that he may change his password.
APPEARS IN
RELATED QUESTIONS
Ms Raveena Sen is an IT expert and a freelancer. She recently used her skills to access the Admin password for the network server of Super Dooper Technology Ltd. and provided confidential data of the organization to its CEO, informing him about the vulnerability of their network security. Out of the following options (i) to (iv), which one most appropriately defines Ms Sen?
Justify the reason for your chosen option :
1) Hacker
2) Cracker
3) Operator
4) Network Admin
In ethical hacking and cyber security, there are ______ types of scanning.
A research student is expected to write a thesis on a topic. The student browses the Internet for the topic and luckily finds it on the Internet. He copies and submits the entire thesis as his own research work. Which of the following activities appropriately categorizes the act of the writer?
Which of the following crime(s) is/are covered under cybercrime?
- Stealing a brand new hard disk from a shop.
- Get into an unknown person's social networking account and start messaging on his behalf.
- Copying some important data from a computer without taking permission from the owner of the data.
- Working on someone's computer with his/her permission.
Which of the following is not a type of cybercrime?
______ is the crime of obtaining the personal or financial information of another person for the sole purpose of assuming that person's name or identity to make transactions or use it to post inappropriate remarks, comments, etc.
How would you recognize if one of your friends is being cyberbullied?
Cite the online activities which would help you detect that your friend is being cyberbullied.
Write the difference between the following -
Non-ethical hacking and Ethical hacking
List down the steps you need to take in order to ensure -
your computer is in good working condition for a longer time.
Which of the following is not a type of cybercrime?
