6. Cyber Security and Digital Citizenship
6. Cyber Security
and Digital Citizenship
6.1. Concept of
cybersecurity
Cybersecurity is the
practice of protecting computers, networks, software, and digital data from
unauthorized access, cyberattacks, and damage. It helps to keep personal,
business, and government information safe while people use the Internet and
digital technologies.
There are various types of
cybersecurity, like network security, application security, information
security, and operational security.
The primary goal of
Cybersecurity is to protect data, systems, and networks from unauthorized
access, theft, and damage. It ensures the CIA triad: Confidentiality
(keeping information private), Integrity (keeping data accurate), and Availability
(making data accessible only to authorized users when needed).
Importance of Cybersecurity
- Protects
personal information like passwords, bank details, and private data.
- Prevents
financial loss caused by online fraud and scams.
- Safeguards
business and government systems from hackers.
- Builds
trust in online services such as e-banking and e-commerce.
- Helps
maintain national security by protecting digital infrastructure.
Preventive
Measures for Cybersecurity (5 points)
- Use strong and unique
passwords for all accounts.
- Install and regularly update
antivirus and firewall software.
- Do not click on suspicious
links or email attachments.
- Use two-factor authentication
(2FA) for extra security.
- Regularly back up important
data to safe storage.
Cyber Law
Cyber Law is the law
that deals with crimes and legal issues related to the use of the Internet,
computers, and digital communication. It helps control online activities like
hacking, cyberbullying, identity theft, and online fraud. Cyber laws protect users,
organizations, and governments by ensuring safe and responsible use of
technology.
Importance of
Cyber Law
- Protects individuals from
cybercrimes like hacking, phishing, and identity theft.
- Provides legal punishment for
online fraud, cyberbullying, and misuse of data.
- Ensures safe use of online
banking, shopping, and e-commerce.
- Builds trust in using the
Internet for education, business, and communication.
- Helps governments and
organizations secure sensitive digital information.
Examples of Cyber
Law
- Electronic and Digital
Signature Law
– Ensures that online signatures are valid and secure for digital
transactions.
- Computer Crime / Cybercrime
Law – Deals
with crimes like hacking, phishing, cyberbullying, and online fraud.
- Intellectual Property Law – Protects inventions,
artistic works, software, and trademarks so that creators’ rights are
respected.
- Data Protection and Privacy
Law –
Protects personal information (like bank details, medical data) from
misuse.
- Trademark Law – Protects logos, names, or
symbols that represent a company or product from being copied.
6.2. Concept of
cybercrime
Cybercrime refers to
the criminal activities carried out by means of computers or the Internet. It
includes crimes like hacking, stealing passwords or bank details, spreading
viruses, cyberbullying, online fraud, and identity theft. Cybercrime harms
individuals, businesses, and governments by stealing information, causing
financial loss, or damaging systems.
Example: A hacker
stealing money through online banking or sending fake emails to trick people
(phishing).
In Nepal, the ETA
(Electronic Transaction Act), 2063 handles controlling the cybercrime related
issues and helps in drafting and implementing laws against cybercrime. (Information
Technology Act)
Types of
Cybercrimes
- Hacking: Hacking is the act of
gaining unauthorized access to a computer system or network to steal,
modify, or damage information.
- Phishing: Phishing is a type of
cybercrime where fake emails, messages, or websites are used to trick
people into sharing sensitive information like passwords or bank details.
- Identity Theft: Identity theft is the
illegal use of someone’s personal information, such as name, credit card,
or social security number, to commit fraud or other crimes.
- Cyberbullying: Cyberbullying is the act of
harassing, threatening, or insulting someone through digital platforms
like social media, emails, or chats.
- Malware Attack: A malware attack is the use
of harmful software such as viruses, worms, spyware, or ransomware to
damage systems or steal data.
- Online Fraud: Online fraud is cheating
people through fake websites, emails, or online transactions to steal
money or property.
- Cyberstalking: Cyberstalking is the
continuous online monitoring, threatening, or harassing of a person to
create fear or harm.
- Software Piracy: Software piracy is the
illegal copying, distribution, or use of copyrighted software without
permission from its owner.
Disadvantages of
Cybercrime
- Loss of Personal Data: Cybercrime can lead to the
theft of sensitive information such as passwords, bank details, and
private documents, causing serious harm to individuals.
- Financial Loss: Online fraud, scams, and
hacking can result in huge financial losses for people, businesses, and
even governments.
- Damage to Systems: Cybercrimes like malware
attacks and ransomware can damage computers, delete files, or lock
systems, making them unusable.
- Mental Stress: Victims of cyberbullying,
stalking, or online threats often suffer from stress, anxiety, and
depression.
- Loss of Trust: Continuous cybercrimes
reduce people’s trust in online services like e-banking, e-commerce, and
digital communication.
6.3 Prevention
methods from cybercrime
- Use
Strong Passwords:
Creating strong and unique passwords makes it difficult for hackers to
guess or crack accounts, keeping personal information safe.
- Install
Antivirus and Firewall:
Antivirus and firewall software protect computers from malware, viruses,
and unauthorized access, reducing cyber threats.
- Regular
Software Updates:
Updating operating systems and applications fixes security weaknesses,
preventing hackers from exploiting old versions.
- Avoid
Suspicious Links and Emails:
Not clicking on unknown links or attachments prevents phishing attacks and
malware infections.
- Use
Two-Factor Authentication (2FA):
Adding an extra step to login, such as a code on mobile, makes accounts
more secure against hacking.
- Backup
Important Data:
Keeping a backup of files ensures that data is not lost permanently in
case of ransomware or system failure.
- Use
Secure Websites (HTTPS):
Doing online banking or shopping only on HTTPS websites ensures safe and
encrypted transactions.
- Educate
Users:
Awareness about cyber threats and safe Internet practices helps people
avoid becoming victims of cybercrime.
Malware
Malware (short for malicious
software) is any harmful program designed to damage computers, steal data,
or gain unauthorized access to systems. It includes viruses, worms, trojans,
spyware, and ransomware. Malware can slow down systems, delete files, or steal
sensitive information like passwords and bank details.
Types of Malware
- Virus
A virus is a type of malware that attaches itself to files or programs and spreads when the infected file is shared. It can delete data or damage the system. - Worm
A worm is a self-replicating program that spreads through networks without needing to attach to files. It can slow down or crash systems. - Trojan
Horse
A trojan looks like a useful program but contains hidden malware. Once installed, it allows hackers to control or steal data from the computer. - Spyware
Spyware secretly monitors user activities, such as browsing habits and keystrokes, to steal personal information like passwords or bank details. - Ransomware
Ransomware locks or encrypts a user’s files and demands money (ransom) to restore access to the data.
Use a strong
password
A password is a
secret word, number, or combination of characters used to protect accounts,
files, or systems from unauthorized access. It acts like a digital key that
only the authorized user should know. A strong password usually includes
letters, numbers, and special symbols to make it difficult for hackers to
guess.
Keeping passwords
secure helps prevent unauthorized access and misuse of personal information.
A password is used to
authenticate and verify the identity of a user, ensuring only authorized access
to accounts and systems.
Here are some tips
to ensure our passwords are secure and strong
- Length – A strong password should be
at least 8–12 characters long.
- Mix of Characters – It should include uppercase
and lowercase letters, numbers, and special symbols.
- Unpredictable – Avoid using common words,
names, or birthdates that hackers can easily guess.
- Unique – Each account should have a
different password to reduce risk.
- Regularly Updated – Changing passwords from
time to time improves security.
Importance of
Using a Strong Password
Strong passwords help
protect user’s accounts from being hacked or guessed easily by others, ensuring
user’s personal information remains secure.
- Protects personal accounts
(email, social media, banking) from hackers.
- Prevents identity theft and
misuse of private information.
- Reduces the risk of online
fraud and financial loss.
- Stops unauthorized access to
sensitive data in computers or networks.
- Builds trust in using online
services safely.
Multi-factor
authentication (MFA)
Multi-Factor
Authentication (MFA) is a security method that requires users to provide two or
more proofs of identity before accessing an account or system. Instead of just
a password, MFA adds extra layers of security like a one-time code sent to a
mobile phone, fingerprint scan, or security question. This makes it much harder
for hackers to break into accounts.
Example: Logging into
Gmail with a password and a verification code sent to your mobile.
Types of
multifactor authentication
·
Thing
you know : Password, Pin
·
Things
you have : OTP, Smartcards
·
Things
you are : Fingerprint recognition, Facial recognition,
Together, they make
accounts much safer.
Software updates
Software updates are
changes released by software developers to improve a program by fixing errors
(bugs), closing security gaps, and adding new features. Updating software
regularly keeps computers and mobile devices safe, secure, and working
efficiently.
Example: Updating
Windows, Android apps, or antivirus software to the latest version.
Authentication
Authentication is the
process of verifying the identity of a user, device, or system before allowing
access to information or resources. It ensures that only authorized people can
use accounts, networks, or services.
Example: Logging into
an email account by entering a username and password.
Use of Firewall
A firewall is a
security system that monitors and controls incoming and outgoing network
traffic based on rules set by the user or organization. It acts as a barrier
between a trusted internal network and untrusted external networks like the
Internet. Firewalls help block hackers, malware, and unauthorized access while
allowing safe communication.
Example: Windows
Firewall that protects personal computers from harmful Internet traffic.
A firewall is used to
protect computers and networks from unauthorized access and cyberattacks. It
filters Internet traffic, blocking harmful data while allowing safe
communication. Firewalls also help prevent malware from entering systems and
keep sensitive information secure.
Biometric System
A biometric system is
a security system that identifies and verifies people based on their unique
physical or behavioral characteristics. It uses features such as fingerprints,
facial recognition, iris scans, or voice patterns to allow access. Since these
traits are unique to every individual, biometric systems provide strong
security compared to passwords.
6.4 Safe web
browsing techniques
Safe web browsing is
the practice of using the Internet carefully and responsibly by following
security measures such as using secure websites, avoiding suspicious links, and
protecting personal information to stay safe from cyber threats.
To prevent such
attacks, here are some safe browsing techniques that help minimize cyber
threats:
- Use secure websites that start
with HTTPS.
- Avoid clicking on suspicious
ads, pop-ups, or links.
- Keep your browser and software
updated regularly.
- Do not share personal or
financial information on untrusted sites.
- Use strong and unique
passwords for online accounts.
- Install and update antivirus
and firewall protection.
- Always log out after using
accounts on public computers or Wi-Fi.
Safe Web Browsing Techniques
- Use
a Secure Connection
Always use trusted Internet connections or VPNs instead of public Wi-Fi, as secure connections reduce the risk of hacking. - Use
a Secure Browser
Browsers like Google Chrome, Mozilla Firefox, or Microsoft Edge provide regular security updates and protect against unsafe websites. - Use
a Secure Search Engine
Search engines like DuckDuckGo or Google Safe Search protect privacy and filter unsafe results, making browsing safer. - Use
Secure Websites
Only visit websites that begin with HTTPS because they encrypt data, ensuring safe online transactions and communication.
6.5 Concept of
Digital Citizen
A digital citizen is
a person who uses the Internet and digital technologies responsibly, safely,
and ethically. A good digital citizen respects others online, protects personal
information, avoids cyberbullying, follows laws, and uses technology to learn,
communicate, and contribute positively to society.
Example: A student
attending online classes, using social media politely, and following
cybersecurity rules is a good digital citizen
To be a good
digital citizen, consider following these guidelines:
- Think Before You Post anything online to avoid
hurting others or sharing harmful content.
- Use the Internet and social
media responsibly and respectfully.
- Protect personal information such as passwords, addresses,
and bank details.
- Avoid cyberbullying,
trolling, or spreading fake news.
- Follow cyber laws and respect copyrights when
using digital content.
- Use strong passwords and update them regularly for
online safety.
- Report harmful or suspicious
online activities to teachers, parents, or authorities.
- Use digital tools for learning,
communication, and positive contribution to society.
Digital citizenship
Digital citizenship
means using the Internet, social media, and digital technologies in a
responsible, safe, and ethical way. A good digital citizen respects others
online, protects personal information, avoids cyberbullying, follows cyber
laws, and thinks before posting anything. Digital citizenship also encourages
using technology for learning, communication, and making a positive
contribution to society.
Example: A student
attending online classes, using polite language on social media, and avoiding
fake news is showing good digital citizenship.
Nine Elements of digital
citizenship
1. Digital Access - Everyone should have equal access
to technology and the Internet.
2. Digital Commerce - Buying and selling goods safely
online using secure methods.
3. Digital Communication - Using emails, messaging, and
social media responsibly and respectfully.
4. Digital Literacy - Learning how to use technology
properly and safely for study and work.
5. Digital Etiquette - Following good manners online,
like being polite and respectful.
6. Digital Law - Obeying rules and laws related to
technology, such as avoiding hacking or piracy.
7. Digital Rights and
Responsibilities - Enjoying
rights like free expression but also being responsible online.
8. Digital Health and Wellness - Maintaining physical and mental
health by balancing screen time and avoiding Internet addiction.
9. Digital Security (Self-Protection)
- Protecting
devices and personal data with strong passwords, antivirus, and safe practices.
6.6 Concept of
Netiquette and online behaviors
Netiquette is the set
of rules and good manners for proper and respectful communication on the
Internet. It guides how people should behave while using emails, social media,
chats, or online forums. Good netiquette includes being polite, avoiding
offensive language, respecting others’ opinions, and thinking before posting
anything online.
Example: Saying “thank
you” in an email, not using ALL CAPS (shouting), and avoiding rude comments
on social media.
Online behaviors are
the ways people act and communicate while using the Internet, social media,
emails, or digital platforms. Good online behavior means being polite,
respectful, and responsible, while bad online behavior includes cyberbullying,
spreading fake news, or posting harmful content. Practicing positive online
behavior helps create a safe and friendly digital environment.
Example: Sharing
helpful information in a class group chat shows good online behavior, while
insulting others in comments shows bad online behavior.
Examples of Good
Netiquette & Online Behavior
- Use polite and respectful
language in emails, chats, and social media.
- Think before posting photos,
comments, or videos online.
- Avoid using ALL CAPS, as it
looks like shouting.
- Respect others’ opinions, even
if you disagree.
- Do not spread fake news,
rumors, or harmful content.
- Give credit to authors and
respect copyrights when using online materials.
- Protect personal information
such as passwords, addresses, and bank details.
- Report cyberbullying, scams,
or harmful activities to teachers, parents, or authorities.
- Use digital tools for
learning, collaboration, and positive contributions.
- Balance screen time and
maintain healthy Internet use.
Examples of Bad
Netiquette & Online Behavior
- Using rude, offensive, or
disrespectful language online.
- Posting or sharing fake news,
rumors, or harmful content.
- Writing in ALL CAPS (which
looks like shouting).
- Ignoring or insulting others’
opinions in online discussions.
- Cyberbullying, trolling, or
harassing people on social media.
- Sharing personal details like
passwords, addresses, or bank details publicly.
- Copying or pirating digital
content without giving credit (plagiarism).
- Spamming by sending too many
unwanted messages or emails.
- Hacking or trying to access
someone’s account without permission.
- Wasting too much time online,
leading to Internet addiction.
6.7 Concept of
digital footprint and privacy in online
A digital footprint
is the record or trail of information that a person leaves behind while using
the Internet. It includes activities such as browsing websites, posting on
social media, sending emails, liking or commenting on posts, and shopping
online. A digital footprint can be positive if we share useful content,
or negative if we post harmful or inappropriate things.
A digital footprint
is sometimes called “A Digital Shadow” or “Electronic Footprint”.
Example: Posting
photos on Facebook, commenting on YouTube, or buying products online all add to
your digital footprint.
Importance of
Digital Footprint
- Shows a person’s online
identity and reputation, which others (like schools or employers) may
check.
- Helps in building a positive
image if used responsibly (e.g., sharing achievements online).
- Can provide evidence of
activities in case of cybercrime or legal issues.
- Guides people to be more responsible
in online behavior, knowing their actions are recorded.
- Affects future
opportunities such as jobs, scholarships, or admissions.
Types of Digital
Footprint
- Active
Digital Footprint
An active digital footprint is created when a user knowingly shares information online. Examples include posting on social media, commenting on blogs, or sending emails. - Passive
Digital Footprint
A passive digital footprint is created without the user’s direct knowledge. Examples include websites tracking browsing history, location data, or search engine logs.
Example: Liking a
post = Active footprint, while cookies saving browsing data = Passive
footprint.
Point |
Active Digital
Footprint |
Passive Digital
Footprint |
Meaning |
Created when we
knowingly share information online. |
Created when data
is collected about us without our direct knowledge. |
User Control |
We control it
because we choose what to post or share. |
We have little or
no control over what websites or apps collect. |
Examples |
Posting photos,
writing comments, sending emails. |
Browsing history,
cookies, IP address, location tracking. |
Awareness |
We are aware we are
creating it. |
Often we are not
aware it is being created. |
How to Manage and
Reduce Digital Footprint
- Think before you post anything online to avoid
sharing harmful or unnecessary content.
- Use privacy settings on social media to control
who can see your information.
- Delete old accounts and remove unwanted posts or
photos.
- Avoid oversharing personal details like phone
numbers, addresses, or passwords.
- Clear browsing history and
cookies
regularly to reduce passive footprints.
- Use strong passwords and 2FA to protect accounts from
misuse.
- Be careful with apps and
websites that
collect unnecessary personal data.
Advantages of Digital Footprints
- Helps
build a positive online reputation when used responsibly.
- Supports
social connection by allowing people to stay in touch, collaborate,
and share ideas online.
- Enables
targeted advertising, where users see ads based on their interests
and needs, making online shopping easier.
- Shows
evidence of achievements such as certificates, projects, or skills.
- Can
be useful for job, scholarship, or college opportunities, as
organizations may check online profiles.
- Useful
in health monitoring, as fitness apps and medical platforms track
activities, diet, or health records for better care.
Disadvantages of Digital Footprints
- May
cause loss of privacy, as personal data can be tracked and misused.
- Can
lead to identity theft if sensitive information is exposed.
- Negative
posts or photos can harm reputation and future opportunities.
- Data
can be used for unwanted targeted advertising or spam.
- Creates
stress and mental pressure, as online actions are permanent and
always visible.
- Health
risks may
arise due to overuse of digital devices and constant online presence.
- Difficult
to erase old or harmful content, as digital footprints are
long-lasting.
Here are some
practical steps you can take to protect yourself from the risks of digital
footprints:
- Think before you post anything online because once
shared, it may stay forever.
- Use strong and unique
passwords for
all accounts and change them regularly.
- Adjust privacy settings on social media to control
who can see your posts and personal details.
- Avoid oversharing personal information like
addresses, phone numbers, or bank details.
- Delete old accounts or remove unwanted posts,
photos, and comments.
- Clear browsing history and
cookies
regularly to reduce passive footprints.
- Be careful with apps and
websites by
checking permissions before installing or signing up.
- Use secure websites (HTTPS) for online banking, shopping,
or forms.
- Enable two-factor
authentication (2FA)
for extra protection on important accounts.
- Report suspicious activities like fake accounts, scams, or
cyberbullying.
Online privacy
Online privacy is the
protection of a person’s personal information while using the Internet. It
means controlling what details (such as name, address, phone number, passwords,
or browsing habits) are shared online and keeping them safe from misuse. Good
online privacy helps prevent identity theft, cyberbullying, and online fraud.
Example: Adjusting
social media privacy settings so only friends can see your posts.
Examples of
Personal Information
- Full name, Home address, Phone
numbers
- Date of birth, Email addresses
- Bank account details and
credit/debit card numbers
- Passwords and PIN codes
- Aadhaar number / Social
security number (ID numbers)
- Location details (live
location or GPS data)
- Personal photos, videos, or
medical records
How to Protect
Online Privacy
- Use strong and unique
passwords for
all online accounts.
- Enable two-factor
authentication (2FA)
for extra security.
- Adjust privacy settings on social media to limit who
can see your posts.
- Avoid oversharing personal information such as
phone numbers, addresses, or bank details.
- Be careful with apps and
websites, and
only allow necessary permissions.
- Use secure websites (HTTPS) for banking, shopping, or
filling forms.
- Clear browsing history and
cookies
regularly to reduce tracking.
- Avoid public Wi-Fi for sensitive activities like
banking.
- Install and update antivirus
software to
protect against malware.
- Think before you post, as online content can stay
forever.
🔐 100 HA-Level MCQs – Cybersecurity
& Digital Citizenship (Class 9)
6.1 Concept of Cybersecurity &
Cyber Law (20 MCQs)
Q1. Which of the following is not
part of the CIA triad in cybersecurity?
a) Confidentiality
b) Integrity
c) Availability
d) Accessibility
✅ Answer:
d) Accessibility
Explanation: CIA triad includes Confidentiality, Integrity, and
Availability. Accessibility is not part of it.
Q2. The main purpose of cybersecurity
is to:
a) Increase Internet speed
b) Protect data and systems from attacks
c) Entertain users with digital tools
d) Reduce storage cost
✅ Answer:
b) Protect data and systems from attacks
Explanation: Cybersecurity ensures safety of data, networks, and systems
from unauthorized access.
Q3. Which type of cybersecurity
protects apps from attacks?
a) Network security
b) Application security
c) Operational security
d) Data privacy
✅ Answer:
b) Application security
Explanation: Application security prevents hackers from exploiting
weaknesses in software.
Q4. What does “Integrity” in the CIA
triad mean?
a) Protecting against malware
b) Keeping data accurate and unchanged
c) Ensuring passwords are strong
d) Allowing all users free access
✅ Answer:
b) Keeping data accurate and unchanged
Explanation: Integrity ensures that information is reliable and not
altered.
Q5. Cyber Law mainly deals with:
a) Mobile app development
b) Online crimes and legal issues
c) Building websites
d) Managing Internet speed
✅ Answer:
b) Online crimes and legal issues
Explanation: Cyber Law governs crimes like hacking, fraud, and misuse of
digital data.
Q6. Which is an example of Cyber Law?
a) Digital Signature Law
b) Citizenship Law
c) Right to Education Act
d) Consumer Rights Law
✅ Answer:
a) Digital Signature Law
Explanation: It ensures security and validity of online transactions.
Q7. Which type of law protects
inventions and software from being copied?
a) Privacy law
b) Intellectual property law
c) Cyberbullying law
d) Computer crime law
✅ Answer:
b) Intellectual property law
Explanation: It secures rights of creators of inventions, art, and
software.
Q8. Which one is not a
preventive cybersecurity measure?
a) Strong passwords
b) Antivirus updates
c) Clicking random links
d) Two-factor authentication
✅ Answer:
c) Clicking random links
Explanation: Suspicious links often contain malware.
Q9. Which part of the CIA triad
ensures information is private?
a) Confidentiality
b) Integrity
c) Availability
d) Usability
✅ Answer:
a) Confidentiality
Explanation: Confidentiality ensures only authorized people access data.
Q10. Why is data backup important?
a) To make computers faster
b) To recover data after attacks
c) To save electricity
d) To update software
✅ Answer:
b) To recover data after attacks
Explanation: Backups protect data from ransomware or system failure.
Q11. Which cyber law punishes hacking
and fraud?
a) Cybercrime law
b) Tax law
c) Citizenship law
d) Commercial law
✅ Answer:
a) Cybercrime law
Explanation: It controls crimes like hacking, phishing, and fraud.
Q12. Which law protects personal bank
details from misuse?
a) Trademark law
b) Data protection law
c) Cyberbullying law
d) Trade law
✅ Answer:
b) Data protection law
Explanation: It ensures privacy of personal information.
Q13. Which cyber law protects company
logos from being copied?
a) Intellectual property law
b) Digital signature law
c) Trademark law
d) Computer crime law
✅ Answer:
c) Trademark law
Explanation: Trademark law safeguards symbols, names, and logos.
Q14. Why is cybersecurity important in
e-banking?
a) To make apps more colorful
b) To prevent financial fraud
c) To speed up transactions
d) To reduce server size
✅ Answer:
b) To prevent financial fraud
Explanation: Cybersecurity protects money and data in online banking.
Q15. Operational security focuses on:
a) Data handling and access rules
b) Speeding up networks
c) Building websites
d) Hardware manufacturing
✅ Answer:
a) Data handling and access rules
Explanation: It controls how data is managed and who can access it.
Q16. Which type of security controls
network traffic?
a) Network security
b) Application security
c) Firewall security
d) Physical security
✅ Answer:
a) Network security
Explanation: It defends networks from intruders and malware.
Q17. What does “Availability” in CIA
triad mean?
a) Data is always accessible to authorized users
b) Passwords are updated
c) Apps are fast
d) Websites are colorful
✅ Answer:
a) Data is always accessible to authorized users
Explanation: Availability ensures data is ready whenever needed.
Q18. Which organization’s system does
cybersecurity also protect?
a) Schools only
b) Businesses and governments
c) Shops only
d) NGOs only
✅ Answer:
b) Businesses and governments
Explanation: Cybersecurity secures sensitive government and business
data.
Q19. Which law ensures online
transactions are legally valid?
a) Trademark law
b) Digital signature law
c) Criminal law
d) Identity theft law
✅ Answer:
b) Digital signature law
Explanation: It secures electronic signatures.
Q20. The ETA 2063 in Nepal deals with:
a) Road safety
b) Electronic transactions and cybercrime
c) Banking tax rules
d) Tourism laws
✅ Answer:
b) Electronic transactions and cybercrime
Explanation: ETA 2063 controls online activities and cybercrimes in
Nepal.
6.2 Cybercrime (15 MCQs)
Q21. Cybercrime means:
a) Digital games
b) Crimes using computers and Internet
c) Online shopping
d) Studying IT
✅ Answer:
b) Crimes using computers and Internet
Explanation: Cybercrime includes hacking, phishing, and online fraud.
Q22. Which of the following is NOT
cybercrime?
a) Hacking
b) Cyberbullying
c) Online shopping
d) Phishing
✅ Answer:
c) Online shopping
Explanation: Shopping online is safe if done legally.
Q23. Sending fake emails to steal bank
details is:
a) Hacking
b) Phishing
c) Malware
d) Piracy
✅ Answer:
b) Phishing
Explanation: Phishing tricks people into sharing sensitive info.
Q24. Which cybercrime involves copying
software illegally?
a) Hacking
b) Malware attack
c) Software piracy
d) Phishing
✅ Answer:
c) Software piracy
Explanation: It’s the illegal distribution of software.
Q25. Cyberstalking refers to:
a) Buying online products
b) Monitoring or harassing someone online
c) Posting photos on social media
d) Reading news online
✅ Answer:
b) Monitoring or harassing someone online
Explanation: Cyberstalking threatens or follows victims online.
Q26. Which cybercrime uses harmful
software?
a) Malware attack
b) Phishing
c) Cyberbullying
d) Piracy
✅ Answer:
a) Malware attack
Explanation: Malware includes viruses, trojans, spyware, etc.
Q27. Which cybercrime involves using
someone’s personal info illegally?
a) Hacking
b) Identity theft
c) Malware
d) Stalking
✅ Answer:
b) Identity theft
Explanation: Criminals use personal data like bank info.
Q28. Cyberbullying means:
a) Friendly chats online
b) Harassing or threatening online
c) Sharing achievements online
d) Posting study notes
✅ Answer:
b) Harassing or threatening online
Explanation: Cyberbullying causes harm through messages or posts.
Q29. Which of the following is an
example of hacking?
a) Accessing someone’s account without permission
b) Sending thank-you messages
c) Studying online courses
d) Installing antivirus
✅ Answer:
a) Accessing someone’s account without permission
Explanation: Unauthorized access to systems is hacking.
Q30. Which act handles cybercrime in
Nepal?
a) Education Act
b) ETA 2063
c) Citizenship Act
d) Health Act
✅ Answer:
b) ETA 2063
Explanation: Electronic Transaction Act 2063 handles cybercrime.
Q31. Spreading viruses through email is
an example of:
a) Phishing
b) Malware attack
c) Cyberbullying
d) Piracy
✅ Answer:
b) Malware attack
Explanation: Viruses spread harmfully through attachments.
Q32. Which crime reduces trust in
e-commerce?
a) Phishing
b) Software piracy
c) Malware
d) Cyberbullying
✅ Answer:
a) Phishing
Explanation: Phishing scams damage trust in online services.
Q33. Which cybercrime causes financial
fraud through fake sites?
a) Online fraud
b) Malware
c) Piracy
d) Stalking
✅ Answer:
a) Online fraud
Explanation: Fake sites trick users into paying money.
Q34. Using pirated software is risky
because:
a) It is expensive
b) It may contain malware
c) It looks old
d) It is free
✅ Answer:
b) It may contain malware
Explanation: Pirated software often hides harmful code.
Q35. Which of the following cybercrimes
directly causes mental stress?
a) Cyberbullying
b) Phishing
c) Piracy
d) Malware
✅ Answer:
a) Cyberbullying
Explanation: Victims face anxiety and depression.
6.3 Prevention from Cybercrime
& Malware (15 MCQs)
Q36. Why are strong passwords important
in cybersecurity?
a) They make accounts colorful
b) They prevent easy guessing by hackers
c) They make login faster
d) They increase storage
✅ Answer:
b) They prevent easy guessing by hackers
Explanation: Strong passwords reduce the risk of unauthorized access.
Q37. Which of the following is the
safest password?
a) 123456
b) school2024
c) My$tr0ngP@ss#45
d) qwerty
✅ Answer:
c) My$tr0ngP@ss#45
Explanation: Strong passwords mix letters, numbers, and symbols.
Q38. What is the purpose of antivirus
software?
a) To design web pages
b) To block malware and viruses
c) To increase Internet speed
d) To provide Wi-Fi access
✅ Answer:
b) To block malware and viruses
Explanation: Antivirus detects and removes harmful programs.
Q39. Why should software updates be
installed regularly?
a) To change computer color themes
b) To fix security gaps and add features
c) To reduce electricity use
d) To increase RAM
✅ Answer:
b) To fix security gaps and add features
Explanation: Updates close weaknesses that hackers exploit.
Q40. Which method helps protect
accounts beyond passwords?
a) Cookies
b) Two-Factor Authentication (2FA)
c) Antivirus
d) Firewall
✅ Answer:
b) Two-Factor Authentication (2FA)
Explanation: 2FA adds an extra step like OTP or fingerprint.
Q41. Which of these is an example of
phishing prevention?
a) Clicking all links to check
b) Ignoring suspicious emails
c) Using public Wi-Fi for banking
d) Sharing password with friends
✅ Answer:
b) Ignoring suspicious emails
Explanation: Avoiding unknown links protects from phishing.
Q42. Backing up data is important
because:
a) It makes Wi-Fi stronger
b) It saves data in case of attack
c) It reduces password length
d) It increases Internet speed
✅ Answer:
b) It saves data in case of attack
Explanation: Backups restore files after ransomware or crashes.
Q43. Which of these websites is safer
for online shopping?
a) http://example.com
b) https://example.com
c) www.example
d) example.org
✅ Answer:
b) https://example.com
Explanation: HTTPS encrypts data for secure transactions.
Q44. Which type of malware looks like a
useful program but is harmful?
a) Worm
b) Trojan horse
c) Spyware
d) Ransomware
✅ Answer:
b) Trojan horse
Explanation: Trojans hide malware inside useful-looking software.
Q45. Which malware spreads without
attaching to files?
a) Virus
b) Worm
c) Trojan
d) Spyware
✅ Answer:
b) Worm
Explanation: Worms self-replicate and spread via networks.
Q46. Spyware mainly:
a) Encrypts files for ransom
b) Monitors user activities secretly
c) Deletes all system files
d) Speeds up Internet
✅ Answer:
b) Monitors user activities secretly
Explanation: Spyware steals browsing and personal data.
Q47. Which malware locks data and
demands money?
a) Virus
b) Worm
c) Ransomware
d) Trojan
✅ Answer:
c) Ransomware
Explanation: Ransomware encrypts files and asks ransom to unlock.
Q48. Which malware deletes or damages
files when infected?
a) Virus
b) Worm
c) Spyware
d) Trojan
✅ Answer:
a) Virus
Explanation: Viruses corrupt or delete system files.
Q49. Which prevention method reduces
risk of malware infection?
a) Downloading pirated software
b) Updating antivirus regularly
c) Clicking unknown ads
d) Using simple passwords
✅ Answer:
b) Updating antivirus regularly
Explanation: Updates keep antivirus effective against new threats.
Q50. Why is firewall important in
malware protection?
a) It increases gaming performance
b) It filters harmful traffic entering a system
c) It changes screen color
d) It removes pirated software
✅ Answer:
b) It filters harmful traffic entering a system
Explanation: Firewalls block unauthorized access and malicious traffic.
6.4 Safe Web Browsing (10 MCQs)
Q51. Which of the following indicates a
secure website?
a) http://
b) https://
c) www.
d) ftp://
✅ Answer:
b) https://
Explanation: HTTPS encrypts data to ensure safe communication.
Q52. Which is the safest network to use
for online banking?
a) Free public Wi-Fi
b) Open café Wi-Fi
c) Home Wi-Fi with password
d) Neighbor’s Wi-Fi
✅ Answer:
c) Home Wi-Fi with password
Explanation: Secure, private connections protect sensitive activities.
Q53. Which browser is considered secure
if regularly updated?
a) Internet Explorer (old versions)
b) Google Chrome
c) Netscape Navigator
d) Any pirated browser
✅ Answer:
b) Google Chrome
Explanation: Modern browsers like Chrome, Firefox, and Edge update
security regularly.
Q54. What is the role of a secure
search engine like DuckDuckGo?
a) Shows more ads
b) Protects user privacy
c) Blocks websites completely
d) Slows down searches
✅ Answer:
b) Protects user privacy
Explanation: Secure search engines do not track user data.
Q55. Which practice is NOT safe for
browsing?
a) Logging out after use
b) Updating browsers
c) Sharing bank details on untrusted sites
d) Using HTTPS websites
✅ Answer:
c) Sharing bank details on untrusted sites
Explanation: Oversharing personal data leads to privacy risks.
Q56. Why should browsing history and
cookies be cleared?
a) To speed up Wi-Fi
b) To reduce online tracking
c) To increase password length
d) To delete installed apps
✅ Answer:
b) To reduce online tracking
Explanation: Clearing cookies protects privacy and reduces passive
digital footprints.
Q57. Which tool helps block harmful
pop-ups?
a) Firewall
b) Pop-up blocker
c) Antivirus
d) VPN
✅ Answer:
b) Pop-up blocker
Explanation: Pop-up blockers prevent malicious or misleading ads.
Q58. Why should antivirus be updated
for safe browsing?
a) To change desktop theme
b) To detect new online threats
c) To save electricity
d) To improve Internet speed
✅ Answer:
b) To detect new online threats
Explanation: Updated antivirus keeps browsing safe from malware.
Q59. Which is the first step of safe
browsing?
a) Using secure connection (VPN or home Wi-Fi)
b) Installing random apps
c) Sharing passwords
d) Clicking ads
✅ Answer:
a) Using secure connection (VPN or home Wi-Fi)
Explanation: Secure networks reduce hacking risks.
Q60. Which browsing habit makes you a
responsible digital citizen?
a) Thinking before posting online
b) Visiting any website without care
c) Ignoring privacy settings
d) Downloading pirated movies
✅ Answer:
a) Thinking before posting online
Explanation: Safe browsing includes responsible posting and awareness.
6.5 Digital Citizenship (15 MCQs)
Q61. A digital citizen is someone who:
a) Uses technology carelessly
b) Uses the Internet responsibly and ethically
c) Avoids all online activities
d) Spends all day on social media
✅ Answer:
b) Uses the Internet responsibly and ethically
Explanation: A digital citizen follows safety, respect, and laws online.
Q62. Which of the following is an
example of good digital citizenship?
a) Sharing passwords with friends
b) Respecting others online
c) Spreading fake news
d) Downloading pirated movies
✅ Answer:
b) Respecting others online
Explanation: Good citizens protect privacy and act politely.
Q63. What does "Think Before You
Post" mean?
a) Post only funny content
b) Avoid posting harmful or inappropriate material
c) Share everything quickly
d) Always use capital letters
✅ Answer:
b) Avoid posting harmful or inappropriate material
Explanation: Responsible digital citizens consider consequences before
posting.
Q64. Which is NOT a guideline of
digital citizenship?
a) Protecting personal data
b) Cyberbullying strangers
c) Reporting harmful content
d) Respecting copyrights
✅ Answer:
b) Cyberbullying strangers
Explanation: Cyberbullying is harmful and against good citizenship.
Q65. Which element of digital
citizenship is about using technology equally?
a) Digital etiquette
b) Digital access
c) Digital law
d) Digital health
✅ Answer:
b) Digital access
Explanation: It ensures everyone gets fair access to technology.
Q66. Which element is about buying and
selling online safely?
a) Digital commerce
b) Digital security
c) Digital etiquette
d) Digital rights
✅ Answer:
a) Digital commerce
Explanation: Safe online transactions are part of digital commerce.
Q67. Which element of digital
citizenship involves good manners online?
a) Digital law
b) Digital etiquette
c) Digital literacy
d) Digital rights
✅ Answer:
b) Digital etiquette
Explanation: It guides respectful communication on the Internet.
Q68. Using strong passwords and
antivirus software is an example of:
a) Digital health
b) Digital literacy
c) Digital security
d) Digital commerce
✅ Answer:
c) Digital security
Explanation: Security protects devices and personal data from misuse.
Q69. Which element deals with learning
to use technology safely?
a) Digital etiquette
b) Digital literacy
c) Digital law
d) Digital commerce
✅ Answer:
b) Digital literacy
Explanation: Literacy means understanding technology properly.
Q70. Balancing screen time and avoiding
addiction belongs to:
a) Digital health and wellness
b) Digital etiquette
c) Digital access
d) Digital commerce
✅ Answer:
a) Digital health and wellness
Explanation: Health involves managing physical and mental well-being
online.
Q71. Which of these is an example of
violating digital law?
a) Respecting copyrights
b) Downloading pirated software
c) Using antivirus
d) Protecting accounts
✅ Answer:
b) Downloading pirated software
Explanation: Piracy breaks intellectual property rights.
Q72. What is the responsibility of a
digital citizen regarding others' work?
a) Copy without permission
b) Give credit to authors
c) Ignore copyrights
d) Share illegally
✅ Answer:
b) Give credit to authors
Explanation: Good digital citizens respect intellectual property.
Q73. Which element focuses on rights
like free expression but also duties?
a) Digital rights and responsibilities
b) Digital law
c) Digital etiquette
d) Digital access
✅ Answer:
a) Digital rights and responsibilities
Explanation: Citizens must balance rights with responsibilities.
Q74. A student using online tools for
group projects shows:
a) Bad online behavior
b) Positive digital citizenship
c) Cyberbullying
d) Digital piracy
✅ Answer:
b) Positive digital citizenship
Explanation: Using digital tools responsibly shows good citizenship.
Q75. Which of the following best
describes digital citizenship?
a) Avoiding the Internet completely
b) Using technology for safe, ethical, and positive purposes
c) Spending more time on games
d) Breaking cyber laws
✅ Answer:
b) Using technology for safe, ethical, and positive purposes
Explanation: Digital citizenship means responsible participation in the
online world.
6.6 Netiquette & Online
Behaviors (10 MCQs)
Q76. What does "Netiquette"
mean?
a) Internet speed test
b) Online manners and etiquette
c) A type of malware
d) Password security
✅ Answer:
b) Online manners and etiquette
Explanation: Netiquette refers to rules for polite and respectful online
communication.
Q77. Which of the following is an
example of good netiquette?
a) Writing in ALL CAPS
b) Respecting others’ opinions online
c) Sharing fake news
d) Insulting others on social media
✅ Answer:
b) Respecting others’ opinions online
Explanation: Good netiquette includes being polite and respectful.
Q78. Using ALL CAPS in online
communication is considered:
a) Good behavior
b) Shouting or rude behavior
c) Respectful
d) Polite
✅ Answer:
b) Shouting or rude behavior
Explanation: ALL CAPS looks like shouting online.
Q79. Which online behavior is harmful?
a) Cyberbullying
b) Helping classmates with study notes
c) Respecting privacy
d) Reporting harmful content
✅ Answer:
a) Cyberbullying
Explanation: Cyberbullying is a negative online behavior.
Q80. What is an example of bad online
behavior?
a) Posting achievements
b) Using pirated software
c) Using secure passwords
d) Respecting copyrights
✅ Answer:
b) Using pirated software
Explanation: Piracy is illegal and unethical.
Q81. Which online behavior builds a
positive environment?
a) Sharing helpful information
b) Trolling classmates online
c) Spamming group chats
d) Ignoring others’ feelings
✅ Answer:
a) Sharing helpful information
Explanation: Positive contributions improve digital spaces.
Q82. Which of the following is NOT good
netiquette?
a) Saying “thank you” in an email
b) Respecting others in group chats
c) Writing abusive comments on posts
d) Thinking before posting photos
✅ Answer:
c) Writing abusive comments on posts
Explanation: Offensive language is bad online behavior.
Q83. Which online behavior harms mental
health?
a) Cyberbullying and trolling
b) Sharing knowledge
c) Attending online classes
d) Using antivirus software
✅ Answer:
a) Cyberbullying and trolling
Explanation: Victims may suffer stress and anxiety.
Q84. Which of the following is a good
online behavior for students?
a) Posting study resources in class groups
b) Sharing bank passwords
c) Spreading rumors on WhatsApp
d) Ignoring privacy settings
✅ Answer:
a) Posting study resources in class groups
Explanation: Helping others online shows responsibility.
Q85. Which best describes bad
netiquette?
a) Respecting laws
b) Polite communication
c) Spamming and insulting others
d) Protecting data
✅ Answer:
c) Spamming and insulting others
Explanation: Bad netiquette includes rude or harmful online behavior.
6.7 Digital Footprint & Online
Privacy (15 MCQs)
Q86. What is a digital footprint?
a) Marks left on a computer keyboard
b) The record of online activities
c) A type of malware
d) A search engine tool
✅ Answer:
b) The record of online activities
Explanation: A digital footprint is the trail of information left when
using the Internet.
Q87. Which of the following is an
example of an active digital footprint?
a) Cookies saving browsing history
b) Location tracking by GPS
c) Posting photos on Instagram
d) Website collecting IP address
✅ Answer:
c) Posting photos on Instagram
Explanation: Active footprints are created knowingly by users.
Q88. Passive digital footprints are
created:
a) Only by students
b) Without the user’s direct knowledge
c) By deleting browsing history
d) By using antivirus
✅ Answer:
b) Without the user’s direct knowledge
Explanation: Passive footprints include tracking by websites and apps.
Q89. Which of the following shows
passive digital footprint?
a) Sending an email
b) Browsing history stored by search engines
c) Uploading a video
d) Commenting on a blog
✅ Answer:
b) Browsing history stored by search engines
Explanation: Users may not be aware their data is being tracked.
Q90. Why is digital footprint
important?
a) It increases Internet speed
b) It affects online reputation and opportunities
c) It reduces storage space
d) It creates malware
✅ Answer:
b) It affects online reputation and opportunities
Explanation: Employers, schools, and others can check footprints.
Q91. Which is a disadvantage of digital
footprints?
a) Helps in job opportunities
b) May lead to loss of privacy
c) Supports social connection
d) Enables health monitoring
✅ Answer:
b) May lead to loss of privacy
Explanation: Personal data can be misused if exposed.
Q92. Which is an advantage of digital
footprint?
a) Identity theft
b) Building positive online reputation
c) Cyberbullying
d) Malware spreading
✅ Answer:
b) Building positive online reputation
Explanation: Responsible use shows achievements and credibility.
Q93. Which of the following can harm
digital reputation?
a) Posting achievements
b) Sharing fake news and abusive posts
c) Using privacy settings
d) Protecting accounts
✅ Answer:
b) Sharing fake news and abusive posts
Explanation: Harmful posts create a negative footprint.
Q94. Which practice reduces passive
digital footprints?
a) Clearing browsing history and cookies
b) Posting photos on social media
c) Sharing achievements online
d) Using hashtags
✅ Answer:
a) Clearing browsing history and cookies
Explanation: Clearing cookies removes tracked information.
Q95. Which step helps maintain a
positive digital footprint?
a) Oversharing personal details
b) Thinking before posting online
c) Using pirated content
d) Cyberbullying
✅ Answer:
b) Thinking before posting online
Explanation: Responsible posting builds a positive online image.
Q96. Which of these is NOT an example
of personal information?
a) Passwords
b) Bank account details
c) Favorite color
d) Home address
✅ Answer:
c) Favorite color
Explanation: Sensitive personal info includes IDs, bank details, and
contacts.
Q97. Online privacy mainly protects:
a) Computers from overheating
b) Personal data from misuse
c) Internet speed
d) Free Wi-Fi access
✅ Answer:
b) Personal data from misuse
Explanation: Online privacy ensures sensitive details remain safe.
Q98. Which of the following is a way to
protect online privacy?
a) Sharing passwords
b) Using two-factor authentication (2FA)
c) Posting phone numbers on social media
d) Accepting all friend requests
✅ Answer:
b) Using two-factor authentication (2FA)
Explanation: 2FA adds an extra layer of account security.
Q99. Why should privacy settings on
social media be adjusted?
a) To control who can see posts and information
b) To make browsing faster
c) To reduce Wi-Fi use
d) To install apps
✅ Answer:
a) To control who can see posts and information
Explanation: Privacy settings prevent strangers from misusing personal
data.
Q100. Which of the following is a risk
of oversharing online?
a) Gaining scholarships
b) Identity theft or fraud
c) Building positive reputation
d) Securing accounts
✅ Answer:
b) Identity theft or fraud
Explanation: Sharing too much data online makes users easy targets for
cybercrime.
📘 Higher Ability Long Questions with
Answers
Set 1: Cybersecurity & Cyber
Law (Q1–Q10)
Q1. Explain the concept of
cybersecurity and how it is different from cyber law.
Answer:
Cybersecurity is the practice of protecting digital systems, networks, and
information from unauthorized access, theft, or damage. It uses technical
methods like firewalls, antivirus, encryption, and authentication.
Cyber law, on the other hand, is the set of legal rules that control online
behavior and punish crimes like hacking, phishing, or identity theft.
While cybersecurity provides technical protection, cyber law provides legal
protection. Both are necessary to ensure safe and trustworthy use of
digital technologies.
Q2. Describe the CIA Triad in
cybersecurity with suitable examples.
Answer:
The CIA Triad refers to Confidentiality, Integrity, and Availability.
- Confidentiality: Ensures private data is not
seen by unauthorized people (e.g., bank password protection).
- Integrity: Ensures data remains accurate
and unchanged (e.g., exam results should not be altered by hackers).
- Availability: Ensures data and systems are
accessible to authorized users when needed (e.g., hospital databases
during emergencies).
These three pillars form the foundation of cybersecurity.
Q3. Discuss the importance of
cybersecurity in education, business, and government.
Answer:
Cybersecurity is important in education to protect online classes,
digital notes, and student records.
In business, it secures customer data, financial transactions, and trade
secrets, preventing financial loss.
In government, cybersecurity protects sensitive data like military
strategies, e-governance systems, and national infrastructure from
cyberattacks.
Thus, cybersecurity ensures trust, continuity, and safety across all sectors.
Q4. Why are preventive measures like
antivirus and firewalls necessary for cybersecurity?
Answer:
Antivirus software scans and removes harmful programs such as viruses, worms,
and trojans. Firewalls act as barriers, filtering network traffic and blocking
unauthorized access.
Without these, computers are easily infected by malware or hacked.
Together, antivirus and firewalls form the first line of defense, protecting
users from data theft, cyberattacks, and financial fraud.
Q5. Explain any five examples of cyber
law and their importance.
Answer:
- Digital
Signature Law:
Validates online signatures in digital transactions.
- Cybercrime
Law: Punishes
hacking, phishing, and online fraud.
- Intellectual
Property Law:
Protects creative works, inventions, and trademarks.
- Data
Protection Law:
Safeguards personal data like medical and financial records.
- Trademark
Law: Protects
company logos and brand names.
These laws create discipline, safety, and fairness in digital activities.
Q6. How does cyber law help in
reducing cybercrimes?
Answer:
Cyber law sets rules for safe Internet use and provides punishment for
cybercriminals. It discourages hackers, scammers, and online fraudsters by
making their activities illegal.
It also protects personal and business data from misuse, ensures copyright
protection, and supports e-banking and e-commerce.
Without cyber law, cybercrimes would increase as there would be no legal
consequences.
Q7. What would be the consequences if
cybersecurity is ignored?
Answer:
Ignoring cybersecurity can cause loss of personal data like passwords, identity
theft, and financial fraud.
Businesses may lose customer trust, suffer financial losses, or face shutdown.
Government systems could be hacked, leading to national security risks.
In general, people will lose confidence in digital services, slowing down
technological progress.
Q8. Differentiate between
cybersecurity threats and cyber laws with examples.
Answer:
- Cybersecurity
threats are
risks like hacking, phishing, malware, and identity theft. For example,
ransomware attack on a hospital system.
- Cyber
laws are
legal measures to punish such threats, like laws against hacking or fraud.
For example, Nepal’s ETA 2063 provides punishment for cybercrimes.
Thus, threats are the problems, and laws are the legal solutions.
Q9. Why is cybersecurity important for
building trust in digital transactions?
Answer:
People use online banking, shopping, and e-learning daily. Cybersecurity
ensures that passwords, credit card numbers, and personal details remain safe.
When customers feel secure, they trust e-commerce and e-banking platforms.
If cybersecurity is weak, users fear fraud and stop using online services.
Therefore, strong cybersecurity builds confidence in digital systems.
Q10. Discuss the relationship between
cybersecurity, cyber law, and digital citizenship.
Answer:
Cybersecurity protects systems and data, cyber law provides rules and
punishments for misuse, and digital citizenship guides responsible online
behavior.
For example, cybersecurity may protect emails with passwords, cyber law
punishes anyone who hacks them, and digital citizenship teaches users not to
misuse others’ data.
Together, these three elements create a safe, legal, and ethical digital
environment.
📘 Higher Ability Long Questions with
Answers
Set 2: Cybercrime (Q11–Q20)
Q11. Define cybercrime and explain why
it is increasing today.
Answer:
Cybercrime is the use of computers or the Internet to commit crimes like
hacking, phishing, or identity theft. It is increasing today because more
people depend on the Internet for banking, shopping, education, and
communication. Criminals take advantage of weak security systems and unaware
users to steal money, data, or spread harmful content.
Q12. Differentiate between hacking and
phishing with examples.
Answer:
- Hacking: Unauthorized access to
computer systems or networks. Example: A hacker breaking into a school’s
database to change marks.
- Phishing: Fake emails or websites
tricking users to reveal information. Example: An email pretending to be
from a bank asking for ATM PIN.
Both are cybercrimes, but hacking forces entry while phishing tricks users.
Q13. Explain how identity theft is
carried out and its effects on victims.
Answer:
Identity theft happens when criminals steal personal details like name, social
security number, or credit card info to commit fraud. They may take loans, shop
online, or commit crimes in the victim’s name. Victims face financial losses,
damaged reputation, and even legal issues for crimes they didn’t commit.
Q14. What is cyberbullying? How can it
affect students?
Answer:
Cyberbullying is using digital platforms to threaten, insult, or harass others.
For students, it may include spreading false rumors, sharing embarrassing
photos, or sending abusive messages. Victims often suffer stress, low
self-esteem, poor academic performance, and even depression.
Q15. Differentiate between malware and
online fraud.
Answer:
- Malware: Harmful software like
viruses, worms, and trojans designed to damage systems or steal data.
- Online
Fraud:
Tricking users into losing money or property through fake websites, scams,
or false promises.
Both are cybercrimes but malware attacks systems directly, while fraud manipulates people for financial gain.
Q16. Explain cyberstalking with an
example.
Answer:
Cyberstalking is the act of continuously monitoring, threatening, or harassing
someone online. For example, a person repeatedly sending unwanted messages,
tracking someone’s social media, or using GPS to follow their movements. It
creates fear, stress, and serious privacy concerns for victims.
Q17. What is software piracy? Why is it
considered a cybercrime?
Answer:
Software piracy is the illegal copying, distribution, or use of software
without permission from its owner. It is a cybercrime because it violates
copyright laws, reduces company profits, and spreads unlicensed or unsafe
software. For example, downloading cracked versions of MS Office without paying
is piracy.
Q18. Explain the disadvantages of
cybercrime for businesses.
Answer:
Cybercrime causes businesses to lose customer trust, financial resources, and
trade secrets. Hackers may steal data, install ransomware, or shut down
websites. This results in loss of income, legal penalties, and long-term damage
to reputation. Many small businesses may even close down after a serious
attack.
Q19. How does Nepal’s ETA 2063 help in
controlling cybercrime?
Answer:
Nepal’s Electronic Transaction Act (ETA) 2063 provides laws to punish
cybercrimes like hacking, phishing, fraud, and misuse of digital signatures. It
ensures that online transactions are safe and reliable. By giving legal
punishment to cybercriminals, it protects citizens, businesses, and government
systems from online threats.
Q20. Discuss the social and
psychological effects of cybercrime.
Answer:
Cybercrime not only causes financial loss but also harms mental health. Victims
of cyberbullying or identity theft may face stress, fear, and depression.
People may lose confidence in using online services, affecting social
connections. Communities also suffer when false news or harmful content spreads
rapidly online.
📘 Higher Ability Long Questions with
Answers
Set 3: Prevention from Cybercrime
& Malware (Q21–Q30)
Q21. Explain five preventive methods to
protect against cybercrime.
Answer:
- Strong
Passwords:
Use long, unique, and complex passwords.
- Antivirus
& Firewall:
Protect devices from malware and hackers.
- Software
Updates: Fix
weaknesses that hackers exploit.
- 2FA
(Two-Factor Authentication):
Adds extra protection beyond a password.
- Data
Backup:
Ensures important files are safe in case of ransomware.
Together, these reduce the risk of hacking, fraud, and data loss.
Q22. How do strong passwords and 2FA
work together to improve security?
Answer:
Strong passwords make accounts difficult to crack, but if hackers guess or
steal them, two-factor authentication (2FA) adds another layer of security.
With 2FA, a one-time code, fingerprint, or face scan is required in addition to
the password. This combination makes unauthorized access nearly impossible.
Q23. Why are regular software updates
important for cybersecurity?
Answer:
Hackers often exploit weaknesses in outdated software. Regular updates fix
these bugs, close security gaps, and improve overall system performance.
Updated antivirus, browsers, and operating systems protect users from new
malware and phishing attacks, keeping devices secure and reliable.
Q24. What is the importance of backing
up data in cybersecurity?
Answer:
Backing up data ensures important files are not permanently lost during a
cyberattack. For example, ransomware may lock files, but backups allow users to
restore them without paying criminals. Backups protect against system crashes,
hardware failures, and accidental deletions too.
Q25. How do antivirus and firewalls
complement each other in prevention?
Answer:
Antivirus detects and removes harmful software like viruses, worms, and
spyware. Firewalls filter incoming and outgoing traffic, blocking unauthorized
access. While antivirus protects files inside the system, firewalls guard the
entry points. Together, they provide a strong defense against cyber threats.
Q26. What is malware? Explain its
impact on systems.
Answer:
Malware, short for malicious software, is any harmful program designed to
damage computers or steal data. It includes viruses, worms, trojans, spyware,
and ransomware. Malware can slow down systems, delete files, steal personal
data, and allow hackers to control devices remotely.
Q27. Differentiate between viruses,
worms, and trojans.
Answer:
- Virus: Attaches to files and spreads
when shared, damaging or deleting data.
- Worm: Spreads automatically across
networks without attaching to files, slowing systems.
- Trojan: Appears useful but contains
hidden malware that gives hackers control.
All are malware, but they spread and harm in different ways.
Q28. What is ransomware? How can people
protect themselves from it?
Answer:
Ransomware locks or encrypts a user’s files and demands money to restore
access. It is dangerous because it causes financial and data loss. To protect
against it, users should regularly back up data, avoid suspicious links, keep
software updated, and use antivirus protection.
Q29. How does spyware affect online
privacy?
Answer:
Spyware secretly monitors user activities, such as browsing habits and
keystrokes, without permission. It can steal passwords, bank details, and
private information. Victims may face identity theft and financial fraud.
Spyware is dangerous because it operates silently in the background.
Q30. Discuss how user awareness is
important in preventing cybercrime.
Answer:
Even with strong security systems, users are often the weakest link. Clicking
suspicious links, oversharing personal data, or using weak passwords can make
them victims of cybercrime. Awareness about threats, safe practices, and
privacy protection helps people avoid scams, phishing, and malware.
📘 Higher Ability Long Questions with
Answers
Set 4: Safe Web Browsing &
Digital Citizenship (Q31–Q40)
Q31. What is safe web browsing? Why is
it important?
Answer:
Safe web browsing means using the Internet responsibly and securely to avoid
cyber threats. It involves using HTTPS websites, avoiding suspicious links, and
protecting personal information. It is important because it prevents identity
theft, fraud, malware infections, and protects online privacy. Responsible
browsing ensures a safe and positive online experience.
Q32. Explain any five safe web browsing
techniques.
Answer:
- Use
secure websites (HTTPS).
- Avoid
clicking on unknown links or pop-ups.
- Keep
browsers and software updated.
- Use
strong passwords and 2FA.
- Log
out from accounts on public computers.
These techniques protect users from scams, malware, and data theft.
Q33. How does a VPN improve safe
browsing?
Answer:
A VPN (Virtual Private Network) encrypts Internet traffic and hides the user’s
IP address. This prevents hackers from tracking or stealing data, especially on
public Wi-Fi. It also allows access to blocked websites safely. VPN ensures
privacy, anonymity, and security in browsing.
Q34. Why should students be careful
while sharing personal information online?
Answer:
Sharing personal details like phone numbers, addresses, or school information
online can attract hackers, scammers, or bullies. Such oversharing may lead to
identity theft, stalking, or misuse of data. Students should protect their
privacy to remain safe and avoid cyber risks.
Q35. How does clearing cookies and
browsing history reduce risks?
Answer:
Cookies and browsing history track user activity and can be used to create
passive digital footprints. Hackers or advertisers may misuse this data.
Clearing them regularly reduces online tracking, prevents targeted scams, and
improves privacy while browsing.
Q36. What is digital citizenship? Why
is it important for students?
Answer:
Digital citizenship is the safe, responsible, and ethical use of technology. It
teaches students to respect others, protect privacy, and avoid harmful
activities like cyberbullying. For students, it is important because it guides
them to use digital tools for learning, collaboration, and building a positive
digital reputation.
Q37. Explain any five qualities of a
good digital citizen.
Answer:
- Thinks
before posting online.
- Protects
personal information.
- Respects
others’ opinions.
- Avoids
spreading fake news or harmful content.
- Follows
cyber laws and copyrights.
These habits make the Internet safe and supportive for everyone.
Q38. How do the nine elements of
digital citizenship guide online behavior?
Answer:
The nine elements cover access, commerce, communication, literacy, etiquette,
law, rights, health, and security. They teach people how to use technology
responsibly, balance screen time, respect laws, and stay safe online. Together,
they build responsible and ethical digital citizens.
Q39. Why is “Think Before You Post” an
essential rule of digital citizenship?
Answer:
Anything shared online can last forever and affect reputation. Negative or
harmful posts can damage trust, relationships, and opportunities. By thinking
before posting, users prevent regret, build a positive digital footprint, and
show respect for others.
Q40. How does digital citizenship help
in reducing cybercrime?
Answer:
Digital citizenship encourages users to act responsibly online by avoiding
harmful activities like hacking, piracy, or cyberbullying. It promotes
awareness of cyber laws, respect for others, and safe Internet use. When people
follow these practices, the chances of cybercrime decrease, creating a safer
digital society.
📘 Higher Ability Long Questions with
Answers
Set 5: Netiquette, Digital
Footprint & Online Privacy (Q41–Q50)
Q41. What is netiquette? Why is it
important in online communication?
Answer:
Netiquette means online etiquette or good manners while using the Internet. It
includes being polite, avoiding offensive language, respecting others’
opinions, and thinking before posting. It is important because it creates a
respectful online environment, prevents conflicts, and promotes healthy digital
communication.
Q42. Give five examples of good
netiquette and explain why they matter.
Answer:
- Use
polite and respectful language.
- Think
before posting photos or comments.
- Avoid
using ALL CAPS (looks like shouting).
- Give
credit to authors when using their work.
- Report
harmful activities instead of ignoring them.
These habits make online spaces safer and more respectful.
Q43. Explain the consequences of bad
online behavior with examples.
Answer:
Bad behavior such as cyberbullying, trolling, spreading fake news, or sharing
offensive content harms individuals and society. For example, insulting
classmates online may hurt their confidence. Spreading fake news creates fear
and confusion. Such actions damage reputation and may lead to legal punishment.
Q44. Differentiate between good and bad
online behaviors.
Answer:
- Good
Behavior:
Respecting others, sharing knowledge, protecting privacy, and helping
classmates online.
- Bad
Behavior:
Cyberbullying, spamming, hacking, spreading rumors, and ignoring laws.
Good behavior creates a positive environment, while bad behavior causes harm and risks legal action.
Q45. What is a digital footprint? Why
is it important?
Answer:
A digital footprint is the record of information a person leaves online, such
as posts, comments, browsing history, and purchases. It is important because it
shows a person’s online identity and reputation. Employers, schools, or
scholarship providers may check it before giving opportunities.
Q46. Differentiate between active and
passive digital footprints with examples.
Answer:
- Active
Footprint:
Created knowingly, like posting on social media, sending emails, or
commenting on blogs.
- Passive
Footprint:
Created without awareness, like cookies tracking browsing history or
location data.
Both shape online identity, but passive footprints are harder to control.
Q47. What are the advantages of digital
footprints?
Answer:
Digital footprints help build a positive online reputation, support social
connections, and provide evidence of achievements. They also enable targeted
advertising, making shopping easier, and help in health monitoring through apps
that track fitness and medical records. When used wisely, footprints create
opportunities.
Q48. What are the disadvantages of
digital footprints?
Answer:
Digital footprints may reduce privacy, cause identity theft, or spread negative
content that harms reputation. Old harmful posts are difficult to erase and may
affect jobs or scholarships. Oversharing personal information also increases
risks of scams and cyberbullying.
Q49. Suggest practical steps to manage
and reduce digital footprints.
Answer:
- Think
before posting anything online.
- Use
privacy settings on social media.
- Delete
old accounts and unwanted posts.
- Clear
browsing history and cookies regularly.
- Avoid
oversharing personal details.
These steps help protect privacy and maintain a positive digital image.
Q50. What is online privacy? How can it
be protected?
Answer:
Online privacy means protecting personal information like passwords, bank
details, and browsing habits from misuse. It can be protected by using strong
passwords, enabling 2FA, adjusting social media privacy settings, avoiding
oversharing, and using secure websites (HTTPS). Protecting privacy ensures
safety and trust in digital life.