Friday, September 19, 2025

6. Cyber Security and Digital Citizenship

  6. Cyber Security and Digital Citizenship

 

6. Cyber Security and Digital Citizenship

 

6.1. Concept of cybersecurity

Cybersecurity is the practice of protecting computers, networks, software, and digital data from unauthorized access, cyberattacks, and damage. It helps to keep personal, business, and government information safe while people use the Internet and digital technologies.

 

There are various types of cybersecurity, like network security, application security, information security, and operational security.

 

The primary goal of Cybersecurity is to protect data, systems, and networks from unauthorized access, theft, and damage. It ensures the CIA triad: Confidentiality (keeping information private), Integrity (keeping data accurate), and Availability (making data accessible only to authorized users when needed).

 

Importance of Cybersecurity

  • Protects personal information like passwords, bank details, and private data.
  • Prevents financial loss caused by online fraud and scams.
  • Safeguards business and government systems from hackers.
  • Builds trust in online services such as e-banking and e-commerce.
  • Helps maintain national security by protecting digital infrastructure.

 

Preventive Measures for Cybersecurity (5 points)

  • Use strong and unique passwords for all accounts.
  • Install and regularly update antivirus and firewall software.
  • Do not click on suspicious links or email attachments.
  • Use two-factor authentication (2FA) for extra security.
  • Regularly back up important data to safe storage.

 

 

Cyber Law

Cyber Law is the law that deals with crimes and legal issues related to the use of the Internet, computers, and digital communication. It helps control online activities like hacking, cyberbullying, identity theft, and online fraud. Cyber laws protect users, organizations, and governments by ensuring safe and responsible use of technology.

 

Importance of Cyber Law

  • Protects individuals from cybercrimes like hacking, phishing, and identity theft.
  • Provides legal punishment for online fraud, cyberbullying, and misuse of data.
  • Ensures safe use of online banking, shopping, and e-commerce.
  • Builds trust in using the Internet for education, business, and communication.
  • Helps governments and organizations secure sensitive digital information.

 

Examples of Cyber Law

  • Electronic and Digital Signature Law – Ensures that online signatures are valid and secure for digital transactions.
  • Computer Crime / Cybercrime Law – Deals with crimes like hacking, phishing, cyberbullying, and online fraud.
  • Intellectual Property Law – Protects inventions, artistic works, software, and trademarks so that creators’ rights are respected.
  • Data Protection and Privacy Law – Protects personal information (like bank details, medical data) from misuse.
  • Trademark Law – Protects logos, names, or symbols that represent a company or product from being copied.

 

6.2. Concept of cybercrime

Cybercrime refers to the criminal activities carried out by means of computers or the Internet. It includes crimes like hacking, stealing passwords or bank details, spreading viruses, cyberbullying, online fraud, and identity theft. Cybercrime harms individuals, businesses, and governments by stealing information, causing financial loss, or damaging systems.

 

Example: A hacker stealing money through online banking or sending fake emails to trick people (phishing).

 

In Nepal, the ETA (Electronic Transaction Act), 2063 handles controlling the cybercrime related issues and helps in drafting and implementing laws against cybercrime. (Information Technology Act)

 

Types of Cybercrimes

  1. Hacking: Hacking is the act of gaining unauthorized access to a computer system or network to steal, modify, or damage information.
  2. Phishing: Phishing is a type of cybercrime where fake emails, messages, or websites are used to trick people into sharing sensitive information like passwords or bank details.
  3. Identity Theft: Identity theft is the illegal use of someone’s personal information, such as name, credit card, or social security number, to commit fraud or other crimes.
  4. Cyberbullying: Cyberbullying is the act of harassing, threatening, or insulting someone through digital platforms like social media, emails, or chats.
  5. Malware Attack: A malware attack is the use of harmful software such as viruses, worms, spyware, or ransomware to damage systems or steal data.
  6. Online Fraud: Online fraud is cheating people through fake websites, emails, or online transactions to steal money or property.
  7. Cyberstalking: Cyberstalking is the continuous online monitoring, threatening, or harassing of a person to create fear or harm.
  8. Software Piracy: Software piracy is the illegal copying, distribution, or use of copyrighted software without permission from its owner.

 

Disadvantages of Cybercrime

  1. Loss of Personal Data: Cybercrime can lead to the theft of sensitive information such as passwords, bank details, and private documents, causing serious harm to individuals.
  2. Financial Loss: Online fraud, scams, and hacking can result in huge financial losses for people, businesses, and even governments.
  3. Damage to Systems: Cybercrimes like malware attacks and ransomware can damage computers, delete files, or lock systems, making them unusable.
  4. Mental Stress: Victims of cyberbullying, stalking, or online threats often suffer from stress, anxiety, and depression.
  5. Loss of Trust: Continuous cybercrimes reduce people’s trust in online services like e-banking, e-commerce, and digital communication.

 

6.3 Prevention methods from cybercrime

  1. Use Strong Passwords: Creating strong and unique passwords makes it difficult for hackers to guess or crack accounts, keeping personal information safe.
  2. Install Antivirus and Firewall: Antivirus and firewall software protect computers from malware, viruses, and unauthorized access, reducing cyber threats.
  3. Regular Software Updates: Updating operating systems and applications fixes security weaknesses, preventing hackers from exploiting old versions.
  4. Avoid Suspicious Links and Emails: Not clicking on unknown links or attachments prevents phishing attacks and malware infections.
  5. Use Two-Factor Authentication (2FA): Adding an extra step to login, such as a code on mobile, makes accounts more secure against hacking.
  6. Backup Important Data: Keeping a backup of files ensures that data is not lost permanently in case of ransomware or system failure.
  7. Use Secure Websites (HTTPS): Doing online banking or shopping only on HTTPS websites ensures safe and encrypted transactions.
  8. Educate Users: Awareness about cyber threats and safe Internet practices helps people avoid becoming victims of cybercrime.

 

Malware

Malware (short for malicious software) is any harmful program designed to damage computers, steal data, or gain unauthorized access to systems. It includes viruses, worms, trojans, spyware, and ransomware. Malware can slow down systems, delete files, or steal sensitive information like passwords and bank details.

 

Types of Malware

  1. Virus
    A virus is a type of malware that attaches itself to files or programs and spreads when the infected file is shared. It can delete data or damage the system.
  2. Worm
    A worm is a self-replicating program that spreads through networks without needing to attach to files. It can slow down or crash systems.
  3. Trojan Horse
    A trojan looks like a useful program but contains hidden malware. Once installed, it allows hackers to control or steal data from the computer.
  4. Spyware
    Spyware secretly monitors user activities, such as browsing habits and keystrokes, to steal personal information like passwords or bank details.
  5. Ransomware
    Ransomware locks or encrypts a user’s files and demands money (ransom) to restore access to the data.

 

Use a strong password

A password is a secret word, number, or combination of characters used to protect accounts, files, or systems from unauthorized access. It acts like a digital key that only the authorized user should know. A strong password usually includes letters, numbers, and special symbols to make it difficult for hackers to guess.

 

Keeping passwords secure helps prevent unauthorized access and misuse of personal information.

 

A password is used to authenticate and verify the identity of a user, ensuring only authorized access to accounts and systems.

 

Here are some tips to ensure our passwords are secure and strong

  1. Length – A strong password should be at least 8–12 characters long.
  2. Mix of Characters – It should include uppercase and lowercase letters, numbers, and special symbols.
  3. Unpredictable – Avoid using common words, names, or birthdates that hackers can easily guess.
  4. Unique – Each account should have a different password to reduce risk.
  5. Regularly Updated – Changing passwords from time to time improves security.

 

 

 

 

Importance of Using a Strong Password

Strong passwords help protect user’s accounts from being hacked or guessed easily by others, ensuring user’s personal information remains secure.

  • Protects personal accounts (email, social media, banking) from hackers.
  • Prevents identity theft and misuse of private information.
  • Reduces the risk of online fraud and financial loss.
  • Stops unauthorized access to sensitive data in computers or networks.
  • Builds trust in using online services safely.

 

Multi-factor authentication (MFA)

Multi-Factor Authentication (MFA) is a security method that requires users to provide two or more proofs of identity before accessing an account or system. Instead of just a password, MFA adds extra layers of security like a one-time code sent to a mobile phone, fingerprint scan, or security question. This makes it much harder for hackers to break into accounts.

Example: Logging into Gmail with a password and a verification code sent to your mobile.

 

Types of multifactor authentication

·       Thing you know : Password, Pin

·       Things you have : OTP, Smartcards

·       Things you are : Fingerprint recognition, Facial recognition,

 

Together, they make accounts much safer.

 

Software updates

Software updates are changes released by software developers to improve a program by fixing errors (bugs), closing security gaps, and adding new features. Updating software regularly keeps computers and mobile devices safe, secure, and working efficiently.

Example: Updating Windows, Android apps, or antivirus software to the latest version.

 

Authentication

Authentication is the process of verifying the identity of a user, device, or system before allowing access to information or resources. It ensures that only authorized people can use accounts, networks, or services.

Example: Logging into an email account by entering a username and password.

 

Use of Firewall

A firewall is a security system that monitors and controls incoming and outgoing network traffic based on rules set by the user or organization. It acts as a barrier between a trusted internal network and untrusted external networks like the Internet. Firewalls help block hackers, malware, and unauthorized access while allowing safe communication.

Example: Windows Firewall that protects personal computers from harmful Internet traffic.

A firewall is used to protect computers and networks from unauthorized access and cyberattacks. It filters Internet traffic, blocking harmful data while allowing safe communication. Firewalls also help prevent malware from entering systems and keep sensitive information secure.

 

Biometric System

A biometric system is a security system that identifies and verifies people based on their unique physical or behavioral characteristics. It uses features such as fingerprints, facial recognition, iris scans, or voice patterns to allow access. Since these traits are unique to every individual, biometric systems provide strong security compared to passwords.

 

 

6.4 Safe web browsing techniques

Safe web browsing is the practice of using the Internet carefully and responsibly by following security measures such as using secure websites, avoiding suspicious links, and protecting personal information to stay safe from cyber threats.

 

To prevent such attacks, here are some safe browsing techniques that help minimize cyber threats:

  • Use secure websites that start with HTTPS.
  • Avoid clicking on suspicious ads, pop-ups, or links.
  • Keep your browser and software updated regularly.
  • Do not share personal or financial information on untrusted sites.
  • Use strong and unique passwords for online accounts.
  • Install and update antivirus and firewall protection.
  • Always log out after using accounts on public computers or Wi-Fi.

 

Safe Web Browsing Techniques

  1. Use a Secure Connection
    Always use trusted Internet connections or VPNs instead of public Wi-Fi, as secure connections reduce the risk of hacking.
  2. Use a Secure Browser
    Browsers like Google Chrome, Mozilla Firefox, or Microsoft Edge provide regular security updates and protect against unsafe websites.
  3. Use a Secure Search Engine
    Search engines like DuckDuckGo or Google Safe Search protect privacy and filter unsafe results, making browsing safer.
  4. Use Secure Websites
    Only visit websites that begin with HTTPS because they encrypt data, ensuring safe online transactions and communication.

 

6.5 Concept of Digital Citizen

A digital citizen is a person who uses the Internet and digital technologies responsibly, safely, and ethically. A good digital citizen respects others online, protects personal information, avoids cyberbullying, follows laws, and uses technology to learn, communicate, and contribute positively to society.

Example: A student attending online classes, using social media politely, and following cybersecurity rules is a good digital citizen

 

To be a good digital citizen, consider following these guidelines:

  • Think Before You Post anything online to avoid hurting others or sharing harmful content.
  • Use the Internet and social media responsibly and respectfully.
  • Protect personal information such as passwords, addresses, and bank details.
  • Avoid cyberbullying, trolling, or spreading fake news.
  • Follow cyber laws and respect copyrights when using digital content.
  • Use strong passwords and update them regularly for online safety.
  • Report harmful or suspicious online activities to teachers, parents, or authorities.
  • Use digital tools for learning, communication, and positive contribution to society.

 

Digital citizenship

Digital citizenship means using the Internet, social media, and digital technologies in a responsible, safe, and ethical way. A good digital citizen respects others online, protects personal information, avoids cyberbullying, follows cyber laws, and thinks before posting anything. Digital citizenship also encourages using technology for learning, communication, and making a positive contribution to society.

Example: A student attending online classes, using polite language on social media, and avoiding fake news is showing good digital citizenship.

Nine Elements of digital citizenship

1.     Digital Access - Everyone should have equal access to technology and the Internet.

2.     Digital Commerce - Buying and selling goods safely online using secure methods.

3.     Digital Communication - Using emails, messaging, and social media responsibly and respectfully.

4.     Digital Literacy - Learning how to use technology properly and safely for study and work.

5.     Digital Etiquette - Following good manners online, like being polite and respectful.

6.     Digital Law - Obeying rules and laws related to technology, such as avoiding hacking or piracy.

7.     Digital Rights and Responsibilities - Enjoying rights like free expression but also being responsible online.

8.     Digital Health and Wellness - Maintaining physical and mental health by balancing screen time and avoiding Internet addiction.

9.     Digital Security (Self-Protection) - Protecting devices and personal data with strong passwords, antivirus, and safe practices.

 

6.6 Concept of Netiquette and online behaviors

Netiquette is the set of rules and good manners for proper and respectful communication on the Internet. It guides how people should behave while using emails, social media, chats, or online forums. Good netiquette includes being polite, avoiding offensive language, respecting others’ opinions, and thinking before posting anything online.

Example: Saying “thank you” in an email, not using ALL CAPS (shouting), and avoiding rude comments on social media.

 

Online behaviors are the ways people act and communicate while using the Internet, social media, emails, or digital platforms. Good online behavior means being polite, respectful, and responsible, while bad online behavior includes cyberbullying, spreading fake news, or posting harmful content. Practicing positive online behavior helps create a safe and friendly digital environment.

Example: Sharing helpful information in a class group chat shows good online behavior, while insulting others in comments shows bad online behavior.

 

Examples of Good Netiquette & Online Behavior

  • Use polite and respectful language in emails, chats, and social media.
  • Think before posting photos, comments, or videos online.
  • Avoid using ALL CAPS, as it looks like shouting.
  • Respect others’ opinions, even if you disagree.
  • Do not spread fake news, rumors, or harmful content.
  • Give credit to authors and respect copyrights when using online materials.
  • Protect personal information such as passwords, addresses, and bank details.
  • Report cyberbullying, scams, or harmful activities to teachers, parents, or authorities.
  • Use digital tools for learning, collaboration, and positive contributions.
  • Balance screen time and maintain healthy Internet use.

 

Examples of Bad Netiquette & Online Behavior

  • Using rude, offensive, or disrespectful language online.
  • Posting or sharing fake news, rumors, or harmful content.
  • Writing in ALL CAPS (which looks like shouting).
  • Ignoring or insulting others’ opinions in online discussions.
  • Cyberbullying, trolling, or harassing people on social media.
  • Sharing personal details like passwords, addresses, or bank details publicly.
  • Copying or pirating digital content without giving credit (plagiarism).
  • Spamming by sending too many unwanted messages or emails.
  • Hacking or trying to access someone’s account without permission.
  • Wasting too much time online, leading to Internet addiction.

6.7 Concept of digital footprint and privacy in online

A digital footprint is the record or trail of information that a person leaves behind while using the Internet. It includes activities such as browsing websites, posting on social media, sending emails, liking or commenting on posts, and shopping online. A digital footprint can be positive if we share useful content, or negative if we post harmful or inappropriate things.

A digital footprint is sometimes called “A Digital Shadow” or “Electronic Footprint”.

Example: Posting photos on Facebook, commenting on YouTube, or buying products online all add to your digital footprint.

 

Importance of Digital Footprint

  • Shows a person’s online identity and reputation, which others (like schools or employers) may check.
  • Helps in building a positive image if used responsibly (e.g., sharing achievements online).
  • Can provide evidence of activities in case of cybercrime or legal issues.
  • Guides people to be more responsible in online behavior, knowing their actions are recorded.
  • Affects future opportunities such as jobs, scholarships, or admissions.

 

Types of Digital Footprint

  1. Active Digital Footprint
    An active digital footprint is created when a user knowingly shares information online. Examples include posting on social media, commenting on blogs, or sending emails.
  2. Passive Digital Footprint
    A passive digital footprint is created without the user’s direct knowledge. Examples include websites tracking browsing history, location data, or search engine logs.

Example: Liking a post = Active footprint, while cookies saving browsing data = Passive footprint.

 

Point

Active Digital Footprint

Passive Digital Footprint

Meaning

Created when we knowingly share information online.

Created when data is collected about us without our direct knowledge.

User Control

We control it because we choose what to post or share.

We have little or no control over what websites or apps collect.

Examples

Posting photos, writing comments, sending emails.

Browsing history, cookies, IP address, location tracking.

Awareness

We are aware we are creating it.

Often we are not aware it is being created.

 

How to Manage and Reduce Digital Footprint

  • Think before you post anything online to avoid sharing harmful or unnecessary content.
  • Use privacy settings on social media to control who can see your information.
  • Delete old accounts and remove unwanted posts or photos.
  • Avoid oversharing personal details like phone numbers, addresses, or passwords.
  • Clear browsing history and cookies regularly to reduce passive footprints.
  • Use strong passwords and 2FA to protect accounts from misuse.
  • Be careful with apps and websites that collect unnecessary personal data.

 

Advantages of Digital Footprints

  • Helps build a positive online reputation when used responsibly.
  • Supports social connection by allowing people to stay in touch, collaborate, and share ideas online.
  • Enables targeted advertising, where users see ads based on their interests and needs, making online shopping easier.
  • Shows evidence of achievements such as certificates, projects, or skills.
  • Can be useful for job, scholarship, or college opportunities, as organizations may check online profiles.
  • Useful in health monitoring, as fitness apps and medical platforms track activities, diet, or health records for better care.

 

Disadvantages of Digital Footprints

  • May cause loss of privacy, as personal data can be tracked and misused.
  • Can lead to identity theft if sensitive information is exposed.
  • Negative posts or photos can harm reputation and future opportunities.
  • Data can be used for unwanted targeted advertising or spam.
  • Creates stress and mental pressure, as online actions are permanent and always visible.
  • Health risks may arise due to overuse of digital devices and constant online presence.
  • Difficult to erase old or harmful content, as digital footprints are long-lasting.

 

Here are some practical steps you can take to protect yourself from the risks of digital footprints:

  • Think before you post anything online because once shared, it may stay forever.
  • Use strong and unique passwords for all accounts and change them regularly.
  • Adjust privacy settings on social media to control who can see your posts and personal details.
  • Avoid oversharing personal information like addresses, phone numbers, or bank details.
  • Delete old accounts or remove unwanted posts, photos, and comments.
  • Clear browsing history and cookies regularly to reduce passive footprints.
  • Be careful with apps and websites by checking permissions before installing or signing up.
  • Use secure websites (HTTPS) for online banking, shopping, or forms.
  • Enable two-factor authentication (2FA) for extra protection on important accounts.
  • Report suspicious activities like fake accounts, scams, or cyberbullying.

 

Online privacy

Online privacy is the protection of a person’s personal information while using the Internet. It means controlling what details (such as name, address, phone number, passwords, or browsing habits) are shared online and keeping them safe from misuse. Good online privacy helps prevent identity theft, cyberbullying, and online fraud.

Example: Adjusting social media privacy settings so only friends can see your posts.

 

Examples of Personal Information

  • Full name, Home address, Phone numbers
  • Date of birth, Email addresses
  • Bank account details and credit/debit card numbers
  • Passwords and PIN codes
  • Aadhaar number / Social security number (ID numbers)
  • Location details (live location or GPS data)
  • Personal photos, videos, or medical records

 

How to Protect Online Privacy

  • Use strong and unique passwords for all online accounts.
  • Enable two-factor authentication (2FA) for extra security.
  • Adjust privacy settings on social media to limit who can see your posts.
  • Avoid oversharing personal information such as phone numbers, addresses, or bank details.
  • Be careful with apps and websites, and only allow necessary permissions.
  • Use secure websites (HTTPS) for banking, shopping, or filling forms.
  • Clear browsing history and cookies regularly to reduce tracking.
  • Avoid public Wi-Fi for sensitive activities like banking.
  • Install and update antivirus software to protect against malware.
  • Think before you post, as online content can stay forever.

 

 


🔐 100 HA-Level MCQs – Cybersecurity & Digital Citizenship (Class 9)


6.1 Concept of Cybersecurity & Cyber Law (20 MCQs)

Q1. Which of the following is not part of the CIA triad in cybersecurity?
a) Confidentiality
b) Integrity
c) Availability
d) Accessibility
Answer: d) Accessibility
Explanation: CIA triad includes Confidentiality, Integrity, and Availability. Accessibility is not part of it.

Q2. The main purpose of cybersecurity is to:
a) Increase Internet speed
b) Protect data and systems from attacks
c) Entertain users with digital tools
d) Reduce storage cost
Answer: b) Protect data and systems from attacks
Explanation: Cybersecurity ensures safety of data, networks, and systems from unauthorized access.

Q3. Which type of cybersecurity protects apps from attacks?
a) Network security
b) Application security
c) Operational security
d) Data privacy
Answer: b) Application security
Explanation: Application security prevents hackers from exploiting weaknesses in software.

Q4. What does “Integrity” in the CIA triad mean?
a) Protecting against malware
b) Keeping data accurate and unchanged
c) Ensuring passwords are strong
d) Allowing all users free access
Answer: b) Keeping data accurate and unchanged
Explanation: Integrity ensures that information is reliable and not altered.

Q5. Cyber Law mainly deals with:
a) Mobile app development
b) Online crimes and legal issues
c) Building websites
d) Managing Internet speed
Answer: b) Online crimes and legal issues
Explanation: Cyber Law governs crimes like hacking, fraud, and misuse of digital data.

Q6. Which is an example of Cyber Law?
a) Digital Signature Law
b) Citizenship Law
c) Right to Education Act
d) Consumer Rights Law
Answer: a) Digital Signature Law
Explanation: It ensures security and validity of online transactions.

Q7. Which type of law protects inventions and software from being copied?
a) Privacy law
b) Intellectual property law
c) Cyberbullying law
d) Computer crime law
Answer: b) Intellectual property law
Explanation: It secures rights of creators of inventions, art, and software.

Q8. Which one is not a preventive cybersecurity measure?
a) Strong passwords
b) Antivirus updates
c) Clicking random links
d) Two-factor authentication
Answer: c) Clicking random links
Explanation: Suspicious links often contain malware.

Q9. Which part of the CIA triad ensures information is private?
a) Confidentiality
b) Integrity
c) Availability
d) Usability
Answer: a) Confidentiality
Explanation: Confidentiality ensures only authorized people access data.

Q10. Why is data backup important?
a) To make computers faster
b) To recover data after attacks
c) To save electricity
d) To update software
Answer: b) To recover data after attacks
Explanation: Backups protect data from ransomware or system failure.

Q11. Which cyber law punishes hacking and fraud?
a) Cybercrime law
b) Tax law
c) Citizenship law
d) Commercial law
Answer: a) Cybercrime law
Explanation: It controls crimes like hacking, phishing, and fraud.

Q12. Which law protects personal bank details from misuse?
a) Trademark law
b) Data protection law
c) Cyberbullying law
d) Trade law
Answer: b) Data protection law
Explanation: It ensures privacy of personal information.

Q13. Which cyber law protects company logos from being copied?
a) Intellectual property law
b) Digital signature law
c) Trademark law
d) Computer crime law
Answer: c) Trademark law
Explanation: Trademark law safeguards symbols, names, and logos.

Q14. Why is cybersecurity important in e-banking?
a) To make apps more colorful
b) To prevent financial fraud
c) To speed up transactions
d) To reduce server size
Answer: b) To prevent financial fraud
Explanation: Cybersecurity protects money and data in online banking.

Q15. Operational security focuses on:
a) Data handling and access rules
b) Speeding up networks
c) Building websites
d) Hardware manufacturing
Answer: a) Data handling and access rules
Explanation: It controls how data is managed and who can access it.

Q16. Which type of security controls network traffic?
a) Network security
b) Application security
c) Firewall security
d) Physical security
Answer: a) Network security
Explanation: It defends networks from intruders and malware.

Q17. What does “Availability” in CIA triad mean?
a) Data is always accessible to authorized users
b) Passwords are updated
c) Apps are fast
d) Websites are colorful
Answer: a) Data is always accessible to authorized users
Explanation: Availability ensures data is ready whenever needed.

Q18. Which organization’s system does cybersecurity also protect?
a) Schools only
b) Businesses and governments
c) Shops only
d) NGOs only
Answer: b) Businesses and governments
Explanation: Cybersecurity secures sensitive government and business data.

Q19. Which law ensures online transactions are legally valid?
a) Trademark law
b) Digital signature law
c) Criminal law
d) Identity theft law
Answer: b) Digital signature law
Explanation: It secures electronic signatures.

Q20. The ETA 2063 in Nepal deals with:
a) Road safety
b) Electronic transactions and cybercrime
c) Banking tax rules
d) Tourism laws
Answer: b) Electronic transactions and cybercrime
Explanation: ETA 2063 controls online activities and cybercrimes in Nepal.


6.2 Cybercrime (15 MCQs)

Q21. Cybercrime means:
a) Digital games
b) Crimes using computers and Internet
c) Online shopping
d) Studying IT
Answer: b) Crimes using computers and Internet
Explanation: Cybercrime includes hacking, phishing, and online fraud.

Q22. Which of the following is NOT cybercrime?
a) Hacking
b) Cyberbullying
c) Online shopping
d) Phishing
Answer: c) Online shopping
Explanation: Shopping online is safe if done legally.

Q23. Sending fake emails to steal bank details is:
a) Hacking
b) Phishing
c) Malware
d) Piracy
Answer: b) Phishing
Explanation: Phishing tricks people into sharing sensitive info.

Q24. Which cybercrime involves copying software illegally?
a) Hacking
b) Malware attack
c) Software piracy
d) Phishing
Answer: c) Software piracy
Explanation: It’s the illegal distribution of software.

Q25. Cyberstalking refers to:
a) Buying online products
b) Monitoring or harassing someone online
c) Posting photos on social media
d) Reading news online
Answer: b) Monitoring or harassing someone online
Explanation: Cyberstalking threatens or follows victims online.

Q26. Which cybercrime uses harmful software?
a) Malware attack
b) Phishing
c) Cyberbullying
d) Piracy
Answer: a) Malware attack
Explanation: Malware includes viruses, trojans, spyware, etc.

Q27. Which cybercrime involves using someone’s personal info illegally?
a) Hacking
b) Identity theft
c) Malware
d) Stalking
Answer: b) Identity theft
Explanation: Criminals use personal data like bank info.

Q28. Cyberbullying means:
a) Friendly chats online
b) Harassing or threatening online
c) Sharing achievements online
d) Posting study notes
Answer: b) Harassing or threatening online
Explanation: Cyberbullying causes harm through messages or posts.

Q29. Which of the following is an example of hacking?
a) Accessing someone’s account without permission
b) Sending thank-you messages
c) Studying online courses
d) Installing antivirus
Answer: a) Accessing someone’s account without permission
Explanation: Unauthorized access to systems is hacking.

Q30. Which act handles cybercrime in Nepal?
a) Education Act
b) ETA 2063
c) Citizenship Act
d) Health Act
Answer: b) ETA 2063
Explanation: Electronic Transaction Act 2063 handles cybercrime.

Q31. Spreading viruses through email is an example of:
a) Phishing
b) Malware attack
c) Cyberbullying
d) Piracy
Answer: b) Malware attack
Explanation: Viruses spread harmfully through attachments.

Q32. Which crime reduces trust in e-commerce?
a) Phishing
b) Software piracy
c) Malware
d) Cyberbullying
Answer: a) Phishing
Explanation: Phishing scams damage trust in online services.

Q33. Which cybercrime causes financial fraud through fake sites?
a) Online fraud
b) Malware
c) Piracy
d) Stalking
Answer: a) Online fraud
Explanation: Fake sites trick users into paying money.

Q34. Using pirated software is risky because:
a) It is expensive
b) It may contain malware
c) It looks old
d) It is free
Answer: b) It may contain malware
Explanation: Pirated software often hides harmful code.

Q35. Which of the following cybercrimes directly causes mental stress?
a) Cyberbullying
b) Phishing
c) Piracy
d) Malware
Answer: a) Cyberbullying
Explanation: Victims face anxiety and depression.

6.3 Prevention from Cybercrime & Malware (15 MCQs)

Q36. Why are strong passwords important in cybersecurity?
a) They make accounts colorful
b) They prevent easy guessing by hackers
c) They make login faster
d) They increase storage
Answer: b) They prevent easy guessing by hackers
Explanation: Strong passwords reduce the risk of unauthorized access.


Q37. Which of the following is the safest password?
a) 123456
b) school2024
c) My$tr0ngP@ss#45
d) qwerty
Answer: c) My$tr0ngP@ss#45
Explanation: Strong passwords mix letters, numbers, and symbols.


Q38. What is the purpose of antivirus software?
a) To design web pages
b) To block malware and viruses
c) To increase Internet speed
d) To provide Wi-Fi access
Answer: b) To block malware and viruses
Explanation: Antivirus detects and removes harmful programs.


Q39. Why should software updates be installed regularly?
a) To change computer color themes
b) To fix security gaps and add features
c) To reduce electricity use
d) To increase RAM
Answer: b) To fix security gaps and add features
Explanation: Updates close weaknesses that hackers exploit.


Q40. Which method helps protect accounts beyond passwords?
a) Cookies
b) Two-Factor Authentication (2FA)
c) Antivirus
d) Firewall
Answer: b) Two-Factor Authentication (2FA)
Explanation: 2FA adds an extra step like OTP or fingerprint.


Q41. Which of these is an example of phishing prevention?
a) Clicking all links to check
b) Ignoring suspicious emails
c) Using public Wi-Fi for banking
d) Sharing password with friends
Answer: b) Ignoring suspicious emails
Explanation: Avoiding unknown links protects from phishing.


Q42. Backing up data is important because:
a) It makes Wi-Fi stronger
b) It saves data in case of attack
c) It reduces password length
d) It increases Internet speed
Answer: b) It saves data in case of attack
Explanation: Backups restore files after ransomware or crashes.


Q43. Which of these websites is safer for online shopping?
a) http://example.com
b) https://example.com
c) www.example
d) example.org
Answer: b) https://example.com
Explanation: HTTPS encrypts data for secure transactions.


Q44. Which type of malware looks like a useful program but is harmful?
a) Worm
b) Trojan horse
c) Spyware
d) Ransomware
Answer: b) Trojan horse
Explanation: Trojans hide malware inside useful-looking software.


Q45. Which malware spreads without attaching to files?
a) Virus
b) Worm
c) Trojan
d) Spyware
Answer: b) Worm
Explanation: Worms self-replicate and spread via networks.


Q46. Spyware mainly:
a) Encrypts files for ransom
b) Monitors user activities secretly
c) Deletes all system files
d) Speeds up Internet
Answer: b) Monitors user activities secretly
Explanation: Spyware steals browsing and personal data.


Q47. Which malware locks data and demands money?
a) Virus
b) Worm
c) Ransomware
d) Trojan
Answer: c) Ransomware
Explanation: Ransomware encrypts files and asks ransom to unlock.


Q48. Which malware deletes or damages files when infected?
a) Virus
b) Worm
c) Spyware
d) Trojan
Answer: a) Virus
Explanation: Viruses corrupt or delete system files.


Q49. Which prevention method reduces risk of malware infection?
a) Downloading pirated software
b) Updating antivirus regularly
c) Clicking unknown ads
d) Using simple passwords
Answer: b) Updating antivirus regularly
Explanation: Updates keep antivirus effective against new threats.


Q50. Why is firewall important in malware protection?
a) It increases gaming performance
b) It filters harmful traffic entering a system
c) It changes screen color
d) It removes pirated software
Answer: b) It filters harmful traffic entering a system
Explanation: Firewalls block unauthorized access and malicious traffic.

6.4 Safe Web Browsing (10 MCQs)

Q51. Which of the following indicates a secure website?
a) http://
b) https://
c) www.
d) ftp://
Answer: b) https://
Explanation: HTTPS encrypts data to ensure safe communication.


Q52. Which is the safest network to use for online banking?
a) Free public Wi-Fi
b) Open café Wi-Fi
c) Home Wi-Fi with password
d) Neighbor’s Wi-Fi
Answer: c) Home Wi-Fi with password
Explanation: Secure, private connections protect sensitive activities.


Q53. Which browser is considered secure if regularly updated?
a) Internet Explorer (old versions)
b) Google Chrome
c) Netscape Navigator
d) Any pirated browser
Answer: b) Google Chrome
Explanation: Modern browsers like Chrome, Firefox, and Edge update security regularly.


Q54. What is the role of a secure search engine like DuckDuckGo?
a) Shows more ads
b) Protects user privacy
c) Blocks websites completely
d) Slows down searches
Answer: b) Protects user privacy
Explanation: Secure search engines do not track user data.


Q55. Which practice is NOT safe for browsing?
a) Logging out after use
b) Updating browsers
c) Sharing bank details on untrusted sites
d) Using HTTPS websites
Answer: c) Sharing bank details on untrusted sites
Explanation: Oversharing personal data leads to privacy risks.


Q56. Why should browsing history and cookies be cleared?
a) To speed up Wi-Fi
b) To reduce online tracking
c) To increase password length
d) To delete installed apps
Answer: b) To reduce online tracking
Explanation: Clearing cookies protects privacy and reduces passive digital footprints.


Q57. Which tool helps block harmful pop-ups?
a) Firewall
b) Pop-up blocker
c) Antivirus
d) VPN
Answer: b) Pop-up blocker
Explanation: Pop-up blockers prevent malicious or misleading ads.


Q58. Why should antivirus be updated for safe browsing?
a) To change desktop theme
b) To detect new online threats
c) To save electricity
d) To improve Internet speed
Answer: b) To detect new online threats
Explanation: Updated antivirus keeps browsing safe from malware.


Q59. Which is the first step of safe browsing?
a) Using secure connection (VPN or home Wi-Fi)
b) Installing random apps
c) Sharing passwords
d) Clicking ads
Answer: a) Using secure connection (VPN or home Wi-Fi)
Explanation: Secure networks reduce hacking risks.


Q60. Which browsing habit makes you a responsible digital citizen?
a) Thinking before posting online
b) Visiting any website without care
c) Ignoring privacy settings
d) Downloading pirated movies
Answer: a) Thinking before posting online
Explanation: Safe browsing includes responsible posting and awareness.

6.5 Digital Citizenship (15 MCQs)

Q61. A digital citizen is someone who:
a) Uses technology carelessly
b) Uses the Internet responsibly and ethically
c) Avoids all online activities
d) Spends all day on social media
Answer: b) Uses the Internet responsibly and ethically
Explanation: A digital citizen follows safety, respect, and laws online.


Q62. Which of the following is an example of good digital citizenship?
a) Sharing passwords with friends
b) Respecting others online
c) Spreading fake news
d) Downloading pirated movies
Answer: b) Respecting others online
Explanation: Good citizens protect privacy and act politely.


Q63. What does "Think Before You Post" mean?
a) Post only funny content
b) Avoid posting harmful or inappropriate material
c) Share everything quickly
d) Always use capital letters
Answer: b) Avoid posting harmful or inappropriate material
Explanation: Responsible digital citizens consider consequences before posting.


Q64. Which is NOT a guideline of digital citizenship?
a) Protecting personal data
b) Cyberbullying strangers
c) Reporting harmful content
d) Respecting copyrights
Answer: b) Cyberbullying strangers
Explanation: Cyberbullying is harmful and against good citizenship.


Q65. Which element of digital citizenship is about using technology equally?
a) Digital etiquette
b) Digital access
c) Digital law
d) Digital health
Answer: b) Digital access
Explanation: It ensures everyone gets fair access to technology.


Q66. Which element is about buying and selling online safely?
a) Digital commerce
b) Digital security
c) Digital etiquette
d) Digital rights
Answer: a) Digital commerce
Explanation: Safe online transactions are part of digital commerce.


Q67. Which element of digital citizenship involves good manners online?
a) Digital law
b) Digital etiquette
c) Digital literacy
d) Digital rights
Answer: b) Digital etiquette
Explanation: It guides respectful communication on the Internet.


Q68. Using strong passwords and antivirus software is an example of:
a) Digital health
b) Digital literacy
c) Digital security
d) Digital commerce
Answer: c) Digital security
Explanation: Security protects devices and personal data from misuse.


Q69. Which element deals with learning to use technology safely?
a) Digital etiquette
b) Digital literacy
c) Digital law
d) Digital commerce
Answer: b) Digital literacy
Explanation: Literacy means understanding technology properly.


Q70. Balancing screen time and avoiding addiction belongs to:
a) Digital health and wellness
b) Digital etiquette
c) Digital access
d) Digital commerce
Answer: a) Digital health and wellness
Explanation: Health involves managing physical and mental well-being online.


Q71. Which of these is an example of violating digital law?
a) Respecting copyrights
b) Downloading pirated software
c) Using antivirus
d) Protecting accounts
Answer: b) Downloading pirated software
Explanation: Piracy breaks intellectual property rights.


Q72. What is the responsibility of a digital citizen regarding others' work?
a) Copy without permission
b) Give credit to authors
c) Ignore copyrights
d) Share illegally
Answer: b) Give credit to authors
Explanation: Good digital citizens respect intellectual property.


Q73. Which element focuses on rights like free expression but also duties?
a) Digital rights and responsibilities
b) Digital law
c) Digital etiquette
d) Digital access
Answer: a) Digital rights and responsibilities
Explanation: Citizens must balance rights with responsibilities.


Q74. A student using online tools for group projects shows:
a) Bad online behavior
b) Positive digital citizenship
c) Cyberbullying
d) Digital piracy
Answer: b) Positive digital citizenship
Explanation: Using digital tools responsibly shows good citizenship.


Q75. Which of the following best describes digital citizenship?
a) Avoiding the Internet completely
b) Using technology for safe, ethical, and positive purposes
c) Spending more time on games
d) Breaking cyber laws
Answer: b) Using technology for safe, ethical, and positive purposes
Explanation: Digital citizenship means responsible participation in the online world.

6.6 Netiquette & Online Behaviors (10 MCQs)

Q76. What does "Netiquette" mean?
a) Internet speed test
b) Online manners and etiquette
c) A type of malware
d) Password security
Answer: b) Online manners and etiquette
Explanation: Netiquette refers to rules for polite and respectful online communication.


Q77. Which of the following is an example of good netiquette?
a) Writing in ALL CAPS
b) Respecting others’ opinions online
c) Sharing fake news
d) Insulting others on social media
Answer: b) Respecting others’ opinions online
Explanation: Good netiquette includes being polite and respectful.


Q78. Using ALL CAPS in online communication is considered:
a) Good behavior
b) Shouting or rude behavior
c) Respectful
d) Polite
Answer: b) Shouting or rude behavior
Explanation: ALL CAPS looks like shouting online.


Q79. Which online behavior is harmful?
a) Cyberbullying
b) Helping classmates with study notes
c) Respecting privacy
d) Reporting harmful content
Answer: a) Cyberbullying
Explanation: Cyberbullying is a negative online behavior.


Q80. What is an example of bad online behavior?
a) Posting achievements
b) Using pirated software
c) Using secure passwords
d) Respecting copyrights
Answer: b) Using pirated software
Explanation: Piracy is illegal and unethical.


Q81. Which online behavior builds a positive environment?
a) Sharing helpful information
b) Trolling classmates online
c) Spamming group chats
d) Ignoring others’ feelings
Answer: a) Sharing helpful information
Explanation: Positive contributions improve digital spaces.


Q82. Which of the following is NOT good netiquette?
a) Saying “thank you” in an email
b) Respecting others in group chats
c) Writing abusive comments on posts
d) Thinking before posting photos
Answer: c) Writing abusive comments on posts
Explanation: Offensive language is bad online behavior.


Q83. Which online behavior harms mental health?
a) Cyberbullying and trolling
b) Sharing knowledge
c) Attending online classes
d) Using antivirus software
Answer: a) Cyberbullying and trolling
Explanation: Victims may suffer stress and anxiety.


Q84. Which of the following is a good online behavior for students?
a) Posting study resources in class groups
b) Sharing bank passwords
c) Spreading rumors on WhatsApp
d) Ignoring privacy settings
Answer: a) Posting study resources in class groups
Explanation: Helping others online shows responsibility.


Q85. Which best describes bad netiquette?
a) Respecting laws
b) Polite communication
c) Spamming and insulting others
d) Protecting data
Answer: c) Spamming and insulting others
Explanation: Bad netiquette includes rude or harmful online behavior.

6.7 Digital Footprint & Online Privacy (15 MCQs)

Q86. What is a digital footprint?
a) Marks left on a computer keyboard
b) The record of online activities
c) A type of malware
d) A search engine tool
Answer: b) The record of online activities
Explanation: A digital footprint is the trail of information left when using the Internet.


Q87. Which of the following is an example of an active digital footprint?
a) Cookies saving browsing history
b) Location tracking by GPS
c) Posting photos on Instagram
d) Website collecting IP address
Answer: c) Posting photos on Instagram
Explanation: Active footprints are created knowingly by users.


Q88. Passive digital footprints are created:
a) Only by students
b) Without the user’s direct knowledge
c) By deleting browsing history
d) By using antivirus
Answer: b) Without the user’s direct knowledge
Explanation: Passive footprints include tracking by websites and apps.


Q89. Which of the following shows passive digital footprint?
a) Sending an email
b) Browsing history stored by search engines
c) Uploading a video
d) Commenting on a blog
Answer: b) Browsing history stored by search engines
Explanation: Users may not be aware their data is being tracked.


Q90. Why is digital footprint important?
a) It increases Internet speed
b) It affects online reputation and opportunities
c) It reduces storage space
d) It creates malware
Answer: b) It affects online reputation and opportunities
Explanation: Employers, schools, and others can check footprints.


Q91. Which is a disadvantage of digital footprints?
a) Helps in job opportunities
b) May lead to loss of privacy
c) Supports social connection
d) Enables health monitoring
Answer: b) May lead to loss of privacy
Explanation: Personal data can be misused if exposed.


Q92. Which is an advantage of digital footprint?
a) Identity theft
b) Building positive online reputation
c) Cyberbullying
d) Malware spreading
Answer: b) Building positive online reputation
Explanation: Responsible use shows achievements and credibility.


Q93. Which of the following can harm digital reputation?
a) Posting achievements
b) Sharing fake news and abusive posts
c) Using privacy settings
d) Protecting accounts
Answer: b) Sharing fake news and abusive posts
Explanation: Harmful posts create a negative footprint.


Q94. Which practice reduces passive digital footprints?
a) Clearing browsing history and cookies
b) Posting photos on social media
c) Sharing achievements online
d) Using hashtags
Answer: a) Clearing browsing history and cookies
Explanation: Clearing cookies removes tracked information.


Q95. Which step helps maintain a positive digital footprint?
a) Oversharing personal details
b) Thinking before posting online
c) Using pirated content
d) Cyberbullying
Answer: b) Thinking before posting online
Explanation: Responsible posting builds a positive online image.


Q96. Which of these is NOT an example of personal information?
a) Passwords
b) Bank account details
c) Favorite color
d) Home address
Answer: c) Favorite color
Explanation: Sensitive personal info includes IDs, bank details, and contacts.


Q97. Online privacy mainly protects:
a) Computers from overheating
b) Personal data from misuse
c) Internet speed
d) Free Wi-Fi access
Answer: b) Personal data from misuse
Explanation: Online privacy ensures sensitive details remain safe.


Q98. Which of the following is a way to protect online privacy?
a) Sharing passwords
b) Using two-factor authentication (2FA)
c) Posting phone numbers on social media
d) Accepting all friend requests
Answer: b) Using two-factor authentication (2FA)
Explanation: 2FA adds an extra layer of account security.


Q99. Why should privacy settings on social media be adjusted?
a) To control who can see posts and information
b) To make browsing faster
c) To reduce Wi-Fi use
d) To install apps
Answer: a) To control who can see posts and information
Explanation: Privacy settings prevent strangers from misusing personal data.


Q100. Which of the following is a risk of oversharing online?
a) Gaining scholarships
b) Identity theft or fraud
c) Building positive reputation
d) Securing accounts
Answer: b) Identity theft or fraud
Explanation: Sharing too much data online makes users easy targets for cybercrime.

 

📘 Higher Ability Long Questions with Answers

Set 1: Cybersecurity & Cyber Law (Q1–Q10)

Q1. Explain the concept of cybersecurity and how it is different from cyber law.
Answer:
Cybersecurity is the practice of protecting digital systems, networks, and information from unauthorized access, theft, or damage. It uses technical methods like firewalls, antivirus, encryption, and authentication.
Cyber law, on the other hand, is the set of legal rules that control online behavior and punish crimes like hacking, phishing, or identity theft.
While cybersecurity provides technical protection, cyber law provides legal protection. Both are necessary to ensure safe and trustworthy use of digital technologies.


Q2. Describe the CIA Triad in cybersecurity with suitable examples.
Answer:
The CIA Triad refers to Confidentiality, Integrity, and Availability.

  • Confidentiality: Ensures private data is not seen by unauthorized people (e.g., bank password protection).
  • Integrity: Ensures data remains accurate and unchanged (e.g., exam results should not be altered by hackers).
  • Availability: Ensures data and systems are accessible to authorized users when needed (e.g., hospital databases during emergencies).
    These three pillars form the foundation of cybersecurity.

Q3. Discuss the importance of cybersecurity in education, business, and government.
Answer:
Cybersecurity is important in education to protect online classes, digital notes, and student records.
In business, it secures customer data, financial transactions, and trade secrets, preventing financial loss.
In government, cybersecurity protects sensitive data like military strategies, e-governance systems, and national infrastructure from cyberattacks.
Thus, cybersecurity ensures trust, continuity, and safety across all sectors.


Q4. Why are preventive measures like antivirus and firewalls necessary for cybersecurity?
Answer:
Antivirus software scans and removes harmful programs such as viruses, worms, and trojans. Firewalls act as barriers, filtering network traffic and blocking unauthorized access.
Without these, computers are easily infected by malware or hacked.
Together, antivirus and firewalls form the first line of defense, protecting users from data theft, cyberattacks, and financial fraud.


Q5. Explain any five examples of cyber law and their importance.
Answer:

  1. Digital Signature Law: Validates online signatures in digital transactions.
  2. Cybercrime Law: Punishes hacking, phishing, and online fraud.
  3. Intellectual Property Law: Protects creative works, inventions, and trademarks.
  4. Data Protection Law: Safeguards personal data like medical and financial records.
  5. Trademark Law: Protects company logos and brand names.
    These laws create discipline, safety, and fairness in digital activities.

Q6. How does cyber law help in reducing cybercrimes?
Answer:
Cyber law sets rules for safe Internet use and provides punishment for cybercriminals. It discourages hackers, scammers, and online fraudsters by making their activities illegal.
It also protects personal and business data from misuse, ensures copyright protection, and supports e-banking and e-commerce.
Without cyber law, cybercrimes would increase as there would be no legal consequences.


Q7. What would be the consequences if cybersecurity is ignored?
Answer:
Ignoring cybersecurity can cause loss of personal data like passwords, identity theft, and financial fraud.
Businesses may lose customer trust, suffer financial losses, or face shutdown.
Government systems could be hacked, leading to national security risks.
In general, people will lose confidence in digital services, slowing down technological progress.


Q8. Differentiate between cybersecurity threats and cyber laws with examples.
Answer:

  • Cybersecurity threats are risks like hacking, phishing, malware, and identity theft. For example, ransomware attack on a hospital system.
  • Cyber laws are legal measures to punish such threats, like laws against hacking or fraud. For example, Nepal’s ETA 2063 provides punishment for cybercrimes.
    Thus, threats are the problems, and laws are the legal solutions.

Q9. Why is cybersecurity important for building trust in digital transactions?
Answer:
People use online banking, shopping, and e-learning daily. Cybersecurity ensures that passwords, credit card numbers, and personal details remain safe.
When customers feel secure, they trust e-commerce and e-banking platforms.
If cybersecurity is weak, users fear fraud and stop using online services.
Therefore, strong cybersecurity builds confidence in digital systems.


Q10. Discuss the relationship between cybersecurity, cyber law, and digital citizenship.
Answer:
Cybersecurity protects systems and data, cyber law provides rules and punishments for misuse, and digital citizenship guides responsible online behavior.
For example, cybersecurity may protect emails with passwords, cyber law punishes anyone who hacks them, and digital citizenship teaches users not to misuse others’ data.
Together, these three elements create a safe, legal, and ethical digital environment.

 

📘 Higher Ability Long Questions with Answers

Set 2: Cybercrime (Q11–Q20)

Q11. Define cybercrime and explain why it is increasing today.
Answer:
Cybercrime is the use of computers or the Internet to commit crimes like hacking, phishing, or identity theft. It is increasing today because more people depend on the Internet for banking, shopping, education, and communication. Criminals take advantage of weak security systems and unaware users to steal money, data, or spread harmful content.


Q12. Differentiate between hacking and phishing with examples.
Answer:

  • Hacking: Unauthorized access to computer systems or networks. Example: A hacker breaking into a school’s database to change marks.
  • Phishing: Fake emails or websites tricking users to reveal information. Example: An email pretending to be from a bank asking for ATM PIN.
    Both are cybercrimes, but hacking forces entry while phishing tricks users.

Q13. Explain how identity theft is carried out and its effects on victims.
Answer:
Identity theft happens when criminals steal personal details like name, social security number, or credit card info to commit fraud. They may take loans, shop online, or commit crimes in the victim’s name. Victims face financial losses, damaged reputation, and even legal issues for crimes they didn’t commit.


Q14. What is cyberbullying? How can it affect students?
Answer:
Cyberbullying is using digital platforms to threaten, insult, or harass others. For students, it may include spreading false rumors, sharing embarrassing photos, or sending abusive messages. Victims often suffer stress, low self-esteem, poor academic performance, and even depression.


Q15. Differentiate between malware and online fraud.
Answer:

  • Malware: Harmful software like viruses, worms, and trojans designed to damage systems or steal data.
  • Online Fraud: Tricking users into losing money or property through fake websites, scams, or false promises.
    Both are cybercrimes but malware attacks systems directly, while fraud manipulates people for financial gain.

Q16. Explain cyberstalking with an example.
Answer:
Cyberstalking is the act of continuously monitoring, threatening, or harassing someone online. For example, a person repeatedly sending unwanted messages, tracking someone’s social media, or using GPS to follow their movements. It creates fear, stress, and serious privacy concerns for victims.


Q17. What is software piracy? Why is it considered a cybercrime?
Answer:
Software piracy is the illegal copying, distribution, or use of software without permission from its owner. It is a cybercrime because it violates copyright laws, reduces company profits, and spreads unlicensed or unsafe software. For example, downloading cracked versions of MS Office without paying is piracy.


Q18. Explain the disadvantages of cybercrime for businesses.
Answer:
Cybercrime causes businesses to lose customer trust, financial resources, and trade secrets. Hackers may steal data, install ransomware, or shut down websites. This results in loss of income, legal penalties, and long-term damage to reputation. Many small businesses may even close down after a serious attack.


Q19. How does Nepal’s ETA 2063 help in controlling cybercrime?
Answer:
Nepal’s Electronic Transaction Act (ETA) 2063 provides laws to punish cybercrimes like hacking, phishing, fraud, and misuse of digital signatures. It ensures that online transactions are safe and reliable. By giving legal punishment to cybercriminals, it protects citizens, businesses, and government systems from online threats.


Q20. Discuss the social and psychological effects of cybercrime.
Answer:
Cybercrime not only causes financial loss but also harms mental health. Victims of cyberbullying or identity theft may face stress, fear, and depression. People may lose confidence in using online services, affecting social connections. Communities also suffer when false news or harmful content spreads rapidly online.

 

📘 Higher Ability Long Questions with Answers

Set 3: Prevention from Cybercrime & Malware (Q21–Q30)

Q21. Explain five preventive methods to protect against cybercrime.
Answer:

  1. Strong Passwords: Use long, unique, and complex passwords.
  2. Antivirus & Firewall: Protect devices from malware and hackers.
  3. Software Updates: Fix weaknesses that hackers exploit.
  4. 2FA (Two-Factor Authentication): Adds extra protection beyond a password.
  5. Data Backup: Ensures important files are safe in case of ransomware.
    Together, these reduce the risk of hacking, fraud, and data loss.

Q22. How do strong passwords and 2FA work together to improve security?
Answer:
Strong passwords make accounts difficult to crack, but if hackers guess or steal them, two-factor authentication (2FA) adds another layer of security. With 2FA, a one-time code, fingerprint, or face scan is required in addition to the password. This combination makes unauthorized access nearly impossible.


Q23. Why are regular software updates important for cybersecurity?
Answer:
Hackers often exploit weaknesses in outdated software. Regular updates fix these bugs, close security gaps, and improve overall system performance. Updated antivirus, browsers, and operating systems protect users from new malware and phishing attacks, keeping devices secure and reliable.


Q24. What is the importance of backing up data in cybersecurity?
Answer:
Backing up data ensures important files are not permanently lost during a cyberattack. For example, ransomware may lock files, but backups allow users to restore them without paying criminals. Backups protect against system crashes, hardware failures, and accidental deletions too.


Q25. How do antivirus and firewalls complement each other in prevention?
Answer:
Antivirus detects and removes harmful software like viruses, worms, and spyware. Firewalls filter incoming and outgoing traffic, blocking unauthorized access. While antivirus protects files inside the system, firewalls guard the entry points. Together, they provide a strong defense against cyber threats.


Q26. What is malware? Explain its impact on systems.
Answer:
Malware, short for malicious software, is any harmful program designed to damage computers or steal data. It includes viruses, worms, trojans, spyware, and ransomware. Malware can slow down systems, delete files, steal personal data, and allow hackers to control devices remotely.


Q27. Differentiate between viruses, worms, and trojans.
Answer:

  • Virus: Attaches to files and spreads when shared, damaging or deleting data.
  • Worm: Spreads automatically across networks without attaching to files, slowing systems.
  • Trojan: Appears useful but contains hidden malware that gives hackers control.
    All are malware, but they spread and harm in different ways.

Q28. What is ransomware? How can people protect themselves from it?
Answer:
Ransomware locks or encrypts a user’s files and demands money to restore access. It is dangerous because it causes financial and data loss. To protect against it, users should regularly back up data, avoid suspicious links, keep software updated, and use antivirus protection.


Q29. How does spyware affect online privacy?
Answer:
Spyware secretly monitors user activities, such as browsing habits and keystrokes, without permission. It can steal passwords, bank details, and private information. Victims may face identity theft and financial fraud. Spyware is dangerous because it operates silently in the background.


Q30. Discuss how user awareness is important in preventing cybercrime.
Answer:
Even with strong security systems, users are often the weakest link. Clicking suspicious links, oversharing personal data, or using weak passwords can make them victims of cybercrime. Awareness about threats, safe practices, and privacy protection helps people avoid scams, phishing, and malware.

 

📘 Higher Ability Long Questions with Answers

Set 4: Safe Web Browsing & Digital Citizenship (Q31–Q40)

Q31. What is safe web browsing? Why is it important?
Answer:
Safe web browsing means using the Internet responsibly and securely to avoid cyber threats. It involves using HTTPS websites, avoiding suspicious links, and protecting personal information. It is important because it prevents identity theft, fraud, malware infections, and protects online privacy. Responsible browsing ensures a safe and positive online experience.


Q32. Explain any five safe web browsing techniques.
Answer:

  1. Use secure websites (HTTPS).
  2. Avoid clicking on unknown links or pop-ups.
  3. Keep browsers and software updated.
  4. Use strong passwords and 2FA.
  5. Log out from accounts on public computers.
    These techniques protect users from scams, malware, and data theft.

Q33. How does a VPN improve safe browsing?
Answer:
A VPN (Virtual Private Network) encrypts Internet traffic and hides the user’s IP address. This prevents hackers from tracking or stealing data, especially on public Wi-Fi. It also allows access to blocked websites safely. VPN ensures privacy, anonymity, and security in browsing.


Q34. Why should students be careful while sharing personal information online?
Answer:
Sharing personal details like phone numbers, addresses, or school information online can attract hackers, scammers, or bullies. Such oversharing may lead to identity theft, stalking, or misuse of data. Students should protect their privacy to remain safe and avoid cyber risks.


Q35. How does clearing cookies and browsing history reduce risks?
Answer:
Cookies and browsing history track user activity and can be used to create passive digital footprints. Hackers or advertisers may misuse this data. Clearing them regularly reduces online tracking, prevents targeted scams, and improves privacy while browsing.


Q36. What is digital citizenship? Why is it important for students?
Answer:
Digital citizenship is the safe, responsible, and ethical use of technology. It teaches students to respect others, protect privacy, and avoid harmful activities like cyberbullying. For students, it is important because it guides them to use digital tools for learning, collaboration, and building a positive digital reputation.


Q37. Explain any five qualities of a good digital citizen.
Answer:

  1. Thinks before posting online.
  2. Protects personal information.
  3. Respects others’ opinions.
  4. Avoids spreading fake news or harmful content.
  5. Follows cyber laws and copyrights.
    These habits make the Internet safe and supportive for everyone.

Q38. How do the nine elements of digital citizenship guide online behavior?
Answer:
The nine elements cover access, commerce, communication, literacy, etiquette, law, rights, health, and security. They teach people how to use technology responsibly, balance screen time, respect laws, and stay safe online. Together, they build responsible and ethical digital citizens.


Q39. Why is “Think Before You Post” an essential rule of digital citizenship?
Answer:
Anything shared online can last forever and affect reputation. Negative or harmful posts can damage trust, relationships, and opportunities. By thinking before posting, users prevent regret, build a positive digital footprint, and show respect for others.


Q40. How does digital citizenship help in reducing cybercrime?
Answer:
Digital citizenship encourages users to act responsibly online by avoiding harmful activities like hacking, piracy, or cyberbullying. It promotes awareness of cyber laws, respect for others, and safe Internet use. When people follow these practices, the chances of cybercrime decrease, creating a safer digital society.

 

📘 Higher Ability Long Questions with Answers

Set 5: Netiquette, Digital Footprint & Online Privacy (Q41–Q50)

Q41. What is netiquette? Why is it important in online communication?
Answer:
Netiquette means online etiquette or good manners while using the Internet. It includes being polite, avoiding offensive language, respecting others’ opinions, and thinking before posting. It is important because it creates a respectful online environment, prevents conflicts, and promotes healthy digital communication.


Q42. Give five examples of good netiquette and explain why they matter.
Answer:

  1. Use polite and respectful language.
  2. Think before posting photos or comments.
  3. Avoid using ALL CAPS (looks like shouting).
  4. Give credit to authors when using their work.
  5. Report harmful activities instead of ignoring them.
    These habits make online spaces safer and more respectful.

Q43. Explain the consequences of bad online behavior with examples.
Answer:
Bad behavior such as cyberbullying, trolling, spreading fake news, or sharing offensive content harms individuals and society. For example, insulting classmates online may hurt their confidence. Spreading fake news creates fear and confusion. Such actions damage reputation and may lead to legal punishment.


Q44. Differentiate between good and bad online behaviors.
Answer:

  • Good Behavior: Respecting others, sharing knowledge, protecting privacy, and helping classmates online.
  • Bad Behavior: Cyberbullying, spamming, hacking, spreading rumors, and ignoring laws.
    Good behavior creates a positive environment, while bad behavior causes harm and risks legal action.

Q45. What is a digital footprint? Why is it important?
Answer:
A digital footprint is the record of information a person leaves online, such as posts, comments, browsing history, and purchases. It is important because it shows a person’s online identity and reputation. Employers, schools, or scholarship providers may check it before giving opportunities.


Q46. Differentiate between active and passive digital footprints with examples.
Answer:

  • Active Footprint: Created knowingly, like posting on social media, sending emails, or commenting on blogs.
  • Passive Footprint: Created without awareness, like cookies tracking browsing history or location data.
    Both shape online identity, but passive footprints are harder to control.

Q47. What are the advantages of digital footprints?
Answer:
Digital footprints help build a positive online reputation, support social connections, and provide evidence of achievements. They also enable targeted advertising, making shopping easier, and help in health monitoring through apps that track fitness and medical records. When used wisely, footprints create opportunities.


Q48. What are the disadvantages of digital footprints?
Answer:
Digital footprints may reduce privacy, cause identity theft, or spread negative content that harms reputation. Old harmful posts are difficult to erase and may affect jobs or scholarships. Oversharing personal information also increases risks of scams and cyberbullying.


Q49. Suggest practical steps to manage and reduce digital footprints.
Answer:

  1. Think before posting anything online.
  2. Use privacy settings on social media.
  3. Delete old accounts and unwanted posts.
  4. Clear browsing history and cookies regularly.
  5. Avoid oversharing personal details.
    These steps help protect privacy and maintain a positive digital image.

Q50. What is online privacy? How can it be protected?
Answer:
Online privacy means protecting personal information like passwords, bank details, and browsing habits from misuse. It can be protected by using strong passwords, enabling 2FA, adjusting social media privacy settings, avoiding oversharing, and using secure websites (HTTPS). Protecting privacy ensures safety and trust in digital life.