{"id":1849,"date":"2025-08-03T02:00:57","date_gmt":"2025-08-03T02:00:57","guid":{"rendered":"https:\/\/itxperts.co.in\/blog\/?p=1849"},"modified":"2025-08-03T02:00:58","modified_gmt":"2025-08-03T02:00:58","slug":"cyber-ethics-notes-cbse-class-10-computer-applications","status":"publish","type":"post","link":"https:\/\/itxperts.co.in\/blog\/cyber-ethics-notes-cbse-class-10-computer-applications\/","title":{"rendered":"Unit 3: Cyber Ethics"},"content":{"rendered":"\n<h3 class=\"wp-block-heading\">1. <strong>Netiquettes<\/strong><\/h3>\n\n\n\n<p><strong>Definition:<\/strong><br><em>Netiquette<\/em> is a combination of &#8220;network&#8221; and &#8220;etiquette&#8221;. It refers to the correct or acceptable way of communicating on the Internet.<\/p>\n\n\n\n<p><strong>Key Netiquettes:<\/strong><\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Be respectful<\/strong> \u2013 Avoid offensive language, bullying, or trolling.<\/li>\n\n\n\n<li><strong>Think before you post<\/strong> \u2013 Avoid posting anything you might regret later.<\/li>\n\n\n\n<li><strong>Avoid spamming<\/strong> \u2013 Do not send unsolicited messages or links.<\/li>\n\n\n\n<li><strong>Use proper language and grammar<\/strong> \u2013 Communicate clearly and politely.<\/li>\n\n\n\n<li><strong>Respect others&#8217; privacy<\/strong> \u2013 Do not share private info without consent.<\/li>\n\n\n\n<li><strong>Do not plagiarize<\/strong> \u2013 Give credit when using others&#8217; work or ideas.<\/li>\n\n\n\n<li><strong>Avoid typing in ALL CAPS<\/strong> \u2013 It&#8217;s considered shouting.<\/li>\n\n\n\n<li><strong>Be careful with humor and sarcasm<\/strong> \u2013 It can be misinterpreted.<\/li>\n<\/ol>\n\n\n\n<p><strong>Example:<\/strong><br>Using \u201cplease\u201d and \u201cthank you\u201d in an email shows netiquette and professionalism.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h3 class=\"wp-block-heading\">2. <strong>Software Licenses and the Open Source Software Movement<\/strong><\/h3>\n\n\n\n<h4 class=\"wp-block-heading\">A. <strong>Software License<\/strong><\/h4>\n\n\n\n<p>A legal agreement that governs the use or redistribution of software.<\/p>\n\n\n\n<p><strong>Types of Software Licenses:<\/strong><\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Proprietary License<\/strong> \u2013 Users buy the right to use the software but cannot modify or share it.\n<ul class=\"wp-block-list\">\n<li>Example: Microsoft Office<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>Freeware<\/strong> \u2013 Free to use but source code is not available.\n<ul class=\"wp-block-list\">\n<li>Example: Adobe Acrobat Reader<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>Shareware<\/strong> \u2013 Free trial with limited features; full version must be purchased.\n<ul class=\"wp-block-list\">\n<li>Example: WinRAR<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>Open Source License<\/strong> \u2013 Free to use, modify, and distribute.\n<ul class=\"wp-block-list\">\n<li>Example: Linux, LibreOffice<\/li>\n<\/ul>\n<\/li>\n<\/ol>\n\n\n\n<h4 class=\"wp-block-heading\">B. <strong>Open Source Software Movement<\/strong><\/h4>\n\n\n\n<p>A global initiative promoting software with open-source code, encouraging collaboration and sharing.<\/p>\n\n\n\n<p><strong>Benefits:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Free access<\/li>\n\n\n\n<li>Transparency<\/li>\n\n\n\n<li>Customization<\/li>\n\n\n\n<li>Community support<\/li>\n<\/ul>\n\n\n\n<p><strong>Popular Open Source Software:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Linux (OS)<\/strong><\/li>\n\n\n\n<li><strong>LibreOffice (Office suite)<\/strong><\/li>\n\n\n\n<li><strong>Mozilla Firefox (Browser)<\/strong><\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h3 class=\"wp-block-heading\">3. <strong>Intellectual Property Rights (IPR), Plagiarism, and Digital Property Rights<\/strong><\/h3>\n\n\n\n<h4 class=\"wp-block-heading\">A. <strong>Intellectual Property Rights (IPR):<\/strong><\/h4>\n\n\n\n<p>Legal rights given to creators for their creations. It includes:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Copyright<\/strong> \u2013 For books, music, software<\/li>\n\n\n\n<li><strong>Trademark<\/strong> \u2013 For brand names\/logos<\/li>\n\n\n\n<li><strong>Patent<\/strong> \u2013 For inventions<\/li>\n<\/ul>\n\n\n\n<p><strong>Purpose:<\/strong><br>To protect the original creator\u2019s work from unauthorized use.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">B. <strong>Plagiarism:<\/strong><\/h4>\n\n\n\n<p>Using someone else&#8217;s work or ideas without giving them credit.<\/p>\n\n\n\n<p><strong>Examples:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Copying text from a website without citation<\/li>\n\n\n\n<li>Submitting someone else\u2019s project as your own<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading\">C. <strong>Digital Property Rights:<\/strong><\/h4>\n\n\n\n<p>Rights that protect the ownership and use of digital content like:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Music<\/li>\n\n\n\n<li>Videos<\/li>\n\n\n\n<li>Software<\/li>\n\n\n\n<li>eBooks<\/li>\n<\/ul>\n\n\n\n<p><strong>Protection Methods:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Digital Rights Management (DRM)<\/li>\n\n\n\n<li>Watermarking<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h3 class=\"wp-block-heading\">4. <strong>Freedom of Information and the Digital Divide<\/strong><\/h3>\n\n\n\n<h4 class=\"wp-block-heading\">A. <strong>Freedom of Information (FoI):<\/strong><\/h4>\n\n\n\n<p>The right to access information held by public authorities.<\/p>\n\n\n\n<p><strong>Importance:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Promotes transparency<\/li>\n\n\n\n<li>Ensures accountability<\/li>\n\n\n\n<li>Helps in informed decision-making<\/li>\n<\/ul>\n\n\n\n<p><strong>India\u2019s FoI Act:<\/strong><br><em>Right to Information (RTI) Act, 2005<\/em> allows citizens to request information from government bodies.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">B. <strong>Digital Divide:<\/strong><\/h4>\n\n\n\n<p>The gap between individuals who have access to modern digital technology and those who do not.<\/p>\n\n\n\n<p><strong>Causes:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Economic inequality<\/li>\n\n\n\n<li>Poor infrastructure<\/li>\n\n\n\n<li>Lack of education<\/li>\n<\/ul>\n\n\n\n<p><strong>Impact:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Unequal opportunities in education, employment, and communication<\/li>\n<\/ul>\n\n\n\n<p><strong>Bridging the Divide:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Affordable internet<\/li>\n\n\n\n<li>Digital literacy programs<\/li>\n\n\n\n<li>Government initiatives like Digital India<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h3 class=\"wp-block-heading\">5. <strong>E-Commerce: Privacy, Fraud, and Secure Data Transmission<\/strong><\/h3>\n\n\n\n<h4 class=\"wp-block-heading\">A. <strong>E-Commerce (Electronic Commerce):<\/strong><\/h4>\n\n\n\n<p>Buying or selling of goods and services using the internet.<\/p>\n\n\n\n<p><strong>Examples:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Amazon, Flipkart (Online Shopping)<\/li>\n\n\n\n<li>Paytm, PhonePe (Online Payments)<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading\">B. <strong>Privacy in E-Commerce:<\/strong><\/h4>\n\n\n\n<p>Protecting customers\u2019 personal and financial data such as:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Name, address, phone number<\/li>\n\n\n\n<li>Credit\/debit card details<\/li>\n<\/ul>\n\n\n\n<p><strong>Measures:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>SSL encryption<\/li>\n\n\n\n<li>Privacy policies<\/li>\n\n\n\n<li>User authentication<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading\">C. <strong>Online Fraud:<\/strong><\/h4>\n\n\n\n<p>Illegal activities performed online to cheat users.<\/p>\n\n\n\n<p><strong>Types of Fraud:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Phishing (fake emails)<\/li>\n\n\n\n<li>Identity theft<\/li>\n\n\n\n<li>Fake websites or apps<\/li>\n<\/ul>\n\n\n\n<p><strong>Prevention:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Use strong passwords<\/li>\n\n\n\n<li>Avoid suspicious links<\/li>\n\n\n\n<li>Use verified websites<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading\">D. <strong>Secure Data Transmission:<\/strong><\/h4>\n\n\n\n<p>Ensuring safe exchange of information over the internet.<\/p>\n\n\n\n<p><strong>Techniques:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Encryption<\/strong> \u2013 Converts data into unreadable form<\/li>\n\n\n\n<li><strong>HTTPS<\/strong> \u2013 Secure version of HTTP<\/li>\n\n\n\n<li><strong>Two-factor Authentication<\/strong> \u2013 Extra layer of security<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">Summary Table<\/h2>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><thead><tr><th>Topic<\/th><th>Description<\/th><th>Examples<\/th><\/tr><\/thead><tbody><tr><td><strong>Netiquettes<\/strong><\/td><td>Online communication rules<\/td><td>Avoid spamming, be respectful<\/td><\/tr><tr><td><strong>Software Licenses<\/strong><\/td><td>Legal terms of software use<\/td><td>Freeware, Open Source<\/td><\/tr><tr><td><strong>Open Source<\/strong><\/td><td>Free and modifiable software<\/td><td>Linux, Firefox<\/td><\/tr><tr><td><strong>IPR &amp; Plagiarism<\/strong><\/td><td>Legal rights and ethical use of content<\/td><td>Copyright, Avoiding copy-paste<\/td><\/tr><tr><td><strong>Freedom of Info<\/strong><\/td><td>Right to access public data<\/td><td>RTI in India<\/td><\/tr><tr><td><strong>Digital Divide<\/strong><\/td><td>Technology access gap<\/td><td>Urban vs Rural areas<\/td><\/tr><tr><td><strong>E-Commerce<\/strong><\/td><td>Online buying\/selling<\/td><td>Amazon, Paytm<\/td><\/tr><tr><td><strong>Privacy &amp; Fraud<\/strong><\/td><td>Protecting user data<\/td><td>HTTPS, Encryption<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">Important Questions for Practice<\/h2>\n\n\n\n<ol class=\"wp-block-list\">\n<li>What are netiquettes? List any four.<\/li>\n\n\n\n<li>Differentiate between freeware and open-source software.<\/li>\n\n\n\n<li>Explain the concept of plagiarism with an example.<\/li>\n\n\n\n<li>What is the digital divide and how can it be reduced?<\/li>\n\n\n\n<li>How is secure data transmission ensured in e-commerce?<\/li>\n\n\n\n<li>Define intellectual property rights and why they are important.<\/li>\n\n\n\n<li>Explain phishing with an example.<\/li>\n<\/ol>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n","protected":false},"excerpt":{"rendered":"<p>1. Netiquettes Definition:Netiquette is a combination of &#8220;network&#8221; and &#8220;etiquette&#8221;. It refers to the correct or acceptable way of communicating on the Internet. Key Netiquettes: Example:Using \u201cplease\u201d and \u201cthank you\u201d in an email shows netiquette and professionalism. 2. Software Licenses and the Open Source Software Movement A. Software License A legal agreement that governs the [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"googlesitekit_rrm_CAow44u0DA:productID":"","footnotes":""},"categories":[205],"tags":[],"class_list":["post-1849","post","type-post","status-publish","format-standard","hentry","category-computer-application"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.9 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Unit 3: Cyber Ethics - Itxperts<\/title>\n<meta name=\"description\" content=\"Complete notes on Unit 3: Cyber Ethics for CBSE Class 10 Computer Applications (165). Covers netiquettes, software licenses, plagiarism, digital rights, e-commerce security, and more with examples and key questions.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/itxperts.co.in\/blog\/cyber-ethics-notes-cbse-class-10-computer-applications\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber Ethics \u2013 CBSE Class 10 Computer Applications (165)\" \/>\n<meta property=\"og:description\" content=\"Complete notes on Unit 3: Cyber Ethics for CBSE Class 10 Computer Applications (165). Covers netiquettes, software licenses, plagiarism, digital rights, e-commerce security, and more with examples and key questions.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/itxperts.co.in\/blog\/cyber-ethics-notes-cbse-class-10-computer-applications\/\" \/>\n<meta property=\"og:site_name\" content=\"Itxperts\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/itxperts.co.in\" \/>\n<meta property=\"article:published_time\" content=\"2025-08-03T02:00:57+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-03T02:00:58+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/itxperts.co.in\/blog\/wp-content\/uploads\/2025\/05\/cropped-cropped-itxperts_logo.png\" \/>\n\t<meta property=\"og:image:width\" content=\"436\" \/>\n\t<meta property=\"og:image:height\" content=\"398\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"@mritxperts\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"@mritxperts\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/itxperts.co.in\/blog\/cyber-ethics-notes-cbse-class-10-computer-applications\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/itxperts.co.in\/blog\/cyber-ethics-notes-cbse-class-10-computer-applications\/\"},\"author\":{\"name\":\"@mritxperts\",\"@id\":\"https:\/\/itxperts.co.in\/blog\/#\/schema\/person\/77ad4d47f9f82583ee23e37010a52fc6\"},\"headline\":\"Unit 3: Cyber Ethics\",\"datePublished\":\"2025-08-03T02:00:57+00:00\",\"dateModified\":\"2025-08-03T02:00:58+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/itxperts.co.in\/blog\/cyber-ethics-notes-cbse-class-10-computer-applications\/\"},\"wordCount\":690,\"publisher\":{\"@id\":\"https:\/\/itxperts.co.in\/blog\/#organization\"},\"articleSection\":[\"Computer Application\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/itxperts.co.in\/blog\/cyber-ethics-notes-cbse-class-10-computer-applications\/\",\"url\":\"https:\/\/itxperts.co.in\/blog\/cyber-ethics-notes-cbse-class-10-computer-applications\/\",\"name\":\"Unit 3: Cyber Ethics - Itxperts\",\"isPartOf\":{\"@id\":\"https:\/\/itxperts.co.in\/blog\/#website\"},\"datePublished\":\"2025-08-03T02:00:57+00:00\",\"dateModified\":\"2025-08-03T02:00:58+00:00\",\"description\":\"Complete notes on Unit 3: Cyber Ethics for CBSE Class 10 Computer Applications (165). Covers netiquettes, software licenses, plagiarism, digital rights, e-commerce security, and more with examples and key questions.\",\"breadcrumb\":{\"@id\":\"https:\/\/itxperts.co.in\/blog\/cyber-ethics-notes-cbse-class-10-computer-applications\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/itxperts.co.in\/blog\/cyber-ethics-notes-cbse-class-10-computer-applications\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/itxperts.co.in\/blog\/cyber-ethics-notes-cbse-class-10-computer-applications\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/itxperts.co.in\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Unit 3: Cyber Ethics\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/itxperts.co.in\/blog\/#website\",\"url\":\"https:\/\/itxperts.co.in\/blog\/\",\"name\":\"Itxperts\",\"description\":\"Leading Website Design Company in Madhya Pradesh\",\"publisher\":{\"@id\":\"https:\/\/itxperts.co.in\/blog\/#organization\"},\"alternateName\":\"Itxperts | Website Development in Madhya Pradesh\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/itxperts.co.in\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/itxperts.co.in\/blog\/#organization\",\"name\":\"Itxperts\",\"alternateName\":\"Leading Website Design Company in Madhya Pradesh \u2013 Itxperts\",\"url\":\"https:\/\/itxperts.co.in\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/itxperts.co.in\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/itxperts.co.in\/blog\/wp-content\/uploads\/2025\/05\/cropped-itxperts_logo.png\",\"contentUrl\":\"https:\/\/itxperts.co.in\/blog\/wp-content\/uploads\/2025\/05\/cropped-itxperts_logo.png\",\"width\":512,\"height\":512,\"caption\":\"Itxperts\"},\"image\":{\"@id\":\"https:\/\/itxperts.co.in\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/itxperts.co.in\",\"https:\/\/www.linkedin.com\/company\/itxpertsshivpuri\/\",\"https:\/\/www.instagram.com\/itxperts.co.in\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/itxperts.co.in\/blog\/#\/schema\/person\/77ad4d47f9f82583ee23e37010a52fc6\",\"name\":\"@mritxperts\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/itxperts.co.in\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/702cffafd84d85872c0d42d33a9fa39140418d7c60a1311a1f8f55b005d0570b?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/702cffafd84d85872c0d42d33a9fa39140418d7c60a1311a1f8f55b005d0570b?s=96&d=mm&r=g\",\"caption\":\"@mritxperts\"},\"description\":\"I am a full-stack web developer from India with over 8 years of experience in building dynamic and responsive web solutions. Specializing in both front-end and back-end development, I have a passion for creating seamless digital experiences. When I'm not coding, I enjoy sharing insights and tutorials on the latest web technologies, helping fellow developers stay ahead in the ever-evolving tech landscape.\",\"sameAs\":[\"https:\/\/itxperts.co.in\/blog\"],\"url\":\"https:\/\/itxperts.co.in\/blog\/author\/mritxpertsgmail-com\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Unit 3: Cyber Ethics - Itxperts","description":"Complete notes on Unit 3: Cyber Ethics for CBSE Class 10 Computer Applications (165). Covers netiquettes, software licenses, plagiarism, digital rights, e-commerce security, and more with examples and key questions.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/itxperts.co.in\/blog\/cyber-ethics-notes-cbse-class-10-computer-applications\/","og_locale":"en_US","og_type":"article","og_title":"Cyber Ethics \u2013 CBSE Class 10 Computer Applications (165)","og_description":"Complete notes on Unit 3: Cyber Ethics for CBSE Class 10 Computer Applications (165). Covers netiquettes, software licenses, plagiarism, digital rights, e-commerce security, and more with examples and key questions.","og_url":"https:\/\/itxperts.co.in\/blog\/cyber-ethics-notes-cbse-class-10-computer-applications\/","og_site_name":"Itxperts","article_publisher":"https:\/\/www.facebook.com\/itxperts.co.in","article_published_time":"2025-08-03T02:00:57+00:00","article_modified_time":"2025-08-03T02:00:58+00:00","og_image":[{"width":436,"height":398,"url":"https:\/\/itxperts.co.in\/blog\/wp-content\/uploads\/2025\/05\/cropped-cropped-itxperts_logo.png","type":"image\/png"}],"author":"@mritxperts","twitter_card":"summary_large_image","twitter_misc":{"Written by":"@mritxperts","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/itxperts.co.in\/blog\/cyber-ethics-notes-cbse-class-10-computer-applications\/#article","isPartOf":{"@id":"https:\/\/itxperts.co.in\/blog\/cyber-ethics-notes-cbse-class-10-computer-applications\/"},"author":{"name":"@mritxperts","@id":"https:\/\/itxperts.co.in\/blog\/#\/schema\/person\/77ad4d47f9f82583ee23e37010a52fc6"},"headline":"Unit 3: Cyber Ethics","datePublished":"2025-08-03T02:00:57+00:00","dateModified":"2025-08-03T02:00:58+00:00","mainEntityOfPage":{"@id":"https:\/\/itxperts.co.in\/blog\/cyber-ethics-notes-cbse-class-10-computer-applications\/"},"wordCount":690,"publisher":{"@id":"https:\/\/itxperts.co.in\/blog\/#organization"},"articleSection":["Computer Application"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/itxperts.co.in\/blog\/cyber-ethics-notes-cbse-class-10-computer-applications\/","url":"https:\/\/itxperts.co.in\/blog\/cyber-ethics-notes-cbse-class-10-computer-applications\/","name":"Unit 3: Cyber Ethics - Itxperts","isPartOf":{"@id":"https:\/\/itxperts.co.in\/blog\/#website"},"datePublished":"2025-08-03T02:00:57+00:00","dateModified":"2025-08-03T02:00:58+00:00","description":"Complete notes on Unit 3: Cyber Ethics for CBSE Class 10 Computer Applications (165). Covers netiquettes, software licenses, plagiarism, digital rights, e-commerce security, and more with examples and key questions.","breadcrumb":{"@id":"https:\/\/itxperts.co.in\/blog\/cyber-ethics-notes-cbse-class-10-computer-applications\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/itxperts.co.in\/blog\/cyber-ethics-notes-cbse-class-10-computer-applications\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/itxperts.co.in\/blog\/cyber-ethics-notes-cbse-class-10-computer-applications\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/itxperts.co.in\/blog\/"},{"@type":"ListItem","position":2,"name":"Unit 3: Cyber Ethics"}]},{"@type":"WebSite","@id":"https:\/\/itxperts.co.in\/blog\/#website","url":"https:\/\/itxperts.co.in\/blog\/","name":"Itxperts","description":"Leading Website Design Company in Madhya Pradesh","publisher":{"@id":"https:\/\/itxperts.co.in\/blog\/#organization"},"alternateName":"Itxperts | Website Development in Madhya Pradesh","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/itxperts.co.in\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/itxperts.co.in\/blog\/#organization","name":"Itxperts","alternateName":"Leading Website Design Company in Madhya Pradesh \u2013 Itxperts","url":"https:\/\/itxperts.co.in\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/itxperts.co.in\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/itxperts.co.in\/blog\/wp-content\/uploads\/2025\/05\/cropped-itxperts_logo.png","contentUrl":"https:\/\/itxperts.co.in\/blog\/wp-content\/uploads\/2025\/05\/cropped-itxperts_logo.png","width":512,"height":512,"caption":"Itxperts"},"image":{"@id":"https:\/\/itxperts.co.in\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/itxperts.co.in","https:\/\/www.linkedin.com\/company\/itxpertsshivpuri\/","https:\/\/www.instagram.com\/itxperts.co.in\/"]},{"@type":"Person","@id":"https:\/\/itxperts.co.in\/blog\/#\/schema\/person\/77ad4d47f9f82583ee23e37010a52fc6","name":"@mritxperts","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/itxperts.co.in\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/702cffafd84d85872c0d42d33a9fa39140418d7c60a1311a1f8f55b005d0570b?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/702cffafd84d85872c0d42d33a9fa39140418d7c60a1311a1f8f55b005d0570b?s=96&d=mm&r=g","caption":"@mritxperts"},"description":"I am a full-stack web developer from India with over 8 years of experience in building dynamic and responsive web solutions. Specializing in both front-end and back-end development, I have a passion for creating seamless digital experiences. When I'm not coding, I enjoy sharing insights and tutorials on the latest web technologies, helping fellow developers stay ahead in the ever-evolving tech landscape.","sameAs":["https:\/\/itxperts.co.in\/blog"],"url":"https:\/\/itxperts.co.in\/blog\/author\/mritxpertsgmail-com\/"}]}},"_links":{"self":[{"href":"https:\/\/itxperts.co.in\/blog\/wp-json\/wp\/v2\/posts\/1849","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/itxperts.co.in\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/itxperts.co.in\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/itxperts.co.in\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/itxperts.co.in\/blog\/wp-json\/wp\/v2\/comments?post=1849"}],"version-history":[{"count":1,"href":"https:\/\/itxperts.co.in\/blog\/wp-json\/wp\/v2\/posts\/1849\/revisions"}],"predecessor-version":[{"id":1850,"href":"https:\/\/itxperts.co.in\/blog\/wp-json\/wp\/v2\/posts\/1849\/revisions\/1850"}],"wp:attachment":[{"href":"https:\/\/itxperts.co.in\/blog\/wp-json\/wp\/v2\/media?parent=1849"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/itxperts.co.in\/blog\/wp-json\/wp\/v2\/categories?post=1849"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/itxperts.co.in\/blog\/wp-json\/wp\/v2\/tags?post=1849"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}