1. Which field has been benefitted using the Information and Communication Technology Tools? a. Education b. Health c. Governance d. All of these 2. Which of the following is a popular travel agency? a. MakeMyTrip b. MagicBricks c. Onlinesbi d. Who 3. Name the act of plagiarism that duplicates noteworthy bits of content straight from a solitary source, without modification. a. Ghost Writer b. Photocopy c. Potluck Paper d. Self Stealer 4. Name the term that is used to refer the freedom from intrusion by the public, especially as a right. a. Plagiarism b. Privacy c. Governance d. Authority 5. Name the term which is used to refer to criminal activity performed using computers and the Internet. a. Stealing b. Plagiarism c. Robbery d. Cyber Crime 6. Name the type of program that contains hidden malicious functions but look like something funny or useful such as a game or utility, but harms the system when executed. a. Spyware b. Pirated Software c. Trojans d. Worms 7. ________________ is a junk mail which in most cases are useless that are send automatically to flood the destination email inbox. a. E-mail b. Junk c. Spam d. Phising 8. An option that is present in any Anti-virus software that disables a virus: a. Fix b. Remove c. Quarantine d. None of these 9. Great Bazaar has employed Yunus Kumar to manage and maintain their networking architecture and wide area connectivity. Which of these best describes his job profile? a. Networking Engineer b. Database Analyst c. Web Designer d. ProgrammerC 10. Sumriddhi is logging in to her gmail account and one of her friends is trying to peep in and figure out her password. Which of the following issues is being infringed? a. Plagiarism b. Privacy c. Intellectual Rights d. None of these 11. Sam Niza, who was born in 1995, is thinking of a password for her online bank account. Which one of the following you would suggest for strengthening the security of her account: a. sam95 b. a99p54c66 c. samniza1995 d. sam1995 12. Amit has learnt photo editing and now he is planning to get a career in web designing, which of the following should he essentially learn: a. C++ b. HTML c. Spreadsheet Package d. Presentation Package 13. It is an offence as per Cyber Laws to use a software without paying the License Fee to the Copyright Owner Company if that software belongs to the class of: a. Shareware b. Freeware c. Open Source d. Proprietary Software B. Fill in the blanks: 1. ___________ is a combination of the use of digital media, educational technology and ICT in education. 2. ___________ allows you to transfer health resources and health care by electronic means. 3. ___________ is the process of using ICT for delivering government services to the nation. 4. ___________ is a term that is used to indicate the process of buying, selling, transferring or exchanging products or services using ICT tools. 5. ___________ is the act of illegally taking away some other persons writing, conversation, song, or even idea and publish or produce it as your own. 6. A ___________ is generally referred to a writer who authors books without taking credit for it and remains anonymous. 7. The term ___________ refers to the freedom from intrusion by the public, especially as a right. 8. ___________ is a term which is used to refer to criminal activity performed using computers and the Internet. 9. ___________ refers to a technique used to gain unauthorized access to a computer system or network and in some cases even making unauthorized use of this access. 10. ___________ programs secretly gather information from the computer it has infected and transmit the information to a different location. C. State whether the following statements are true or false: 1. Anti-virus is a software is used to remove or disable virus in your computer. [ ] 2. Intellectual property rights may be defined as the rights given to persons over the creations of their minds. [ ] 3. Programming in C++ is essential for being a Web Developer. [ ] 4. Geospatial professionals are responsible for developing geographic information. [ ] 5. Piracy is the act of illegally taking away some other persons writing, conversation, song, or even idea and publish or produce it as your own. [ ] 6. Virus is a term which is used to refer to criminal activity performed using computers and the Internet. [ ] 7. Plagiarism refers to a technique used to gain unauthorized access to a computer system or network and in some cases even making unauthorized use of this access. [ ] 8. Hijack this is a malicious program that hijacks your browser. [ ] 9. Spam is a junk mail/mails which in most cases are useless that are send automatically to flood the destination email inbox. [ ] 10. Worms are similar to virus but do not depend upon another program to replicate it. [ ]