MULTIPLE CHOICE QUESTIONS
1.
Online
posting of rumours, giving threats online, posting the victim’s personal
information, comments aimed to publicly ridicule a victim is termed as
a.
Cyber bullying
b.
Cyber crime
c.
Cyber insult
d.
All of the above
2.
Ankit
made a ERP - Enterprise resource planning solution for a renowned university
and registered and Copyrights for the same. Which of the most important
option; Ankit got the copyrights.
a)
To get society status
b)
To get fame
c)
To get community welfare
d) To secure finance protection
3.
Which of the following is not an example of Social media platform?
a. Facebook
b.
Pinterest
c.
Google+
d.
Social channel
4. A responsible netizen must abide by
a.
Net etiquettes
b.
Communication etiquettes
c.
Social media etiquettes
d.
All of the above
5.
A is some lines of malicious code that can copy itself and
can have detrimental effect on the computers, by destroying data or corrupting
the system.
a.
Cyber crime
b.
Computer virus
c. Program
d.
Software
a)
Surfing internet
b)
Visiting a website
c)
Sending an email to a friend
d)
None of the above
7.
You are
planning to go for a vacation. You surfed the internet to get answers for
following queries.
a)
Places to visit
b)
Availability of air tickets and fares
c)
Best hotel deals
d)
All of these
8. Legal term to describe
the rights of a creator of original creative or artistic work is called……..
a)
Copyright
b)
Copyleft
c)
GPL
d)
BSD
9.
Intellectual Property is legally
protected through
a)
copyright
b)
patent
c)
registered trademark
d)
All of the above
10.
includes
any visual symbol, word, name, design, slogan, label, etc., that distinguishes
the brand from other brands.
a)
Trademark
b)
Patent
c)
Copyright
d)
None of the above
11. Gaining
unauthorised access to a network or computer aur digital files with malicious
intentions, is
called
a. Cracking
b. Hacking
c.
Banging
d. Phishing
12. Legal term to describe the rights of a creator of original
creative or artistic
work is called
a. Copyright
b. Copyleft
c.
GPL
d. None of these
13.
OSS stands for
a. Open system security
b. Open system source
c.
Open software and security
d. Open source software
14. Any
fraudulent business practice that extracts money e from an unsuspecting,
ignorant person is called
a.
Stealing
b. Scam
c.
Violation of copyright
d. Digital footprint
15.
means no price is to be paid for the software.
a. Free software
b.
Freeware
c.
shareware
d. Open source software
16. Any work /
information that exist in digital form idea on internet or on an electronic
device, is known as property.
a.
Licence property
b. digital property
c.
source code property
d. software property
17.
Discarded electrical or or electronic devices are known as .
a. E waste
b. Software Waste
c.
Hardware waste
d. Computer waste
18.
The least restrictive open sourcelicence is licence.
a. Apache Licence
b. MIT licence
c.
GNU licence
d. BSD licence
19.
The original code written by programmers for a software
is known as
a. Object code
b. Source code
c.
Python code
d. Language code
20.
means freedom to use the software.
a. Plagiarism
b. Freeware
c.
Open software
d. Free software
21.
IAD means
a. Internet advanced
data
b. Internet addiction
disorder
c.
Internet advanced digitalization
d. Internet aggregate
data
22.
The is the Digital trail of your activity on the internet.
a. Copyleft
b. Digital footprint
c.
Digital data
d. Internet property
23. The the are the
permissions given to use a product or someone's creator by the copyright
holder.
a. Source code
b. Licence
c.
Software authority
d. Digital rights
24.
is a licence that gives right opposite to copyright.
a. Left copy
b. Digital copy
c.
Copyleft
d. IPR
25.
A software that can be freely accessed
and modified is called
a. synchronous software
b. package software
c.
open source software
d. middleware.
26.
Which of the following is an advantage
of open source software?
a.
You can edit the source code to customise it
b.
you need to be an expert to edit code
c.
you have to pay
d. can sometimes with two generic for specialist purposes.
27.
Which of the following is a disadvantage of open source software?
a. high quality software with lots of features.
b. not as customizable
c.
may not have been tested as much as proprietary software so might have bugs.
d.
you can added the source code to customize it
28.
Which of the following is an advantage
of proprietary software?
a. It is usually free
b. thoroughly tested because people are paying to use it.
c.
Not as customizable.
d. Can sometimes be to generate for specialist purposes.
29.
Which of the following is a disadvantage of proprietary software?
a.
You need to be an expert to edit code.
b.
You have to pay for this type of software.
c.
It’s licensed.
d.
It is launched after proper testing.
30. The
generally recognized term for the government protection afforded to
intellectual property written
and electronic is
called
a. Computer security law.
b. Aggregate information.
c.
Copyright law
d. Data security standards.
31.
Which of the following would be a creative work protected by copyright?
a. A list of all Indian President
names
b. A Portrait of your family
c.
A song you wrote
d. The name of your pet dog
32.
Which of the following is not done by cyber criminals?
a. Unauthorised account access
b. Mass Attack using trojans
as botnets
c.
Email spoofing and spamming
d. report vulnerabilty in any system
33.
What is the name of the IT law that India is having in the Indian legislature?
a. India's Technology IT Act 2000
b. India's Digital information technology DIT Act, 2000
c.
India's Information Technology IT Act, 2000
d. The technology act, 2008.
34.
What is meant by
the term cybercrime?
a. Any crime that uses computers to jeopardize or attempt to jeoparadise in national security
b. The use of computer networks to commit financial
or identity fraud
c.
The theft of Digital information
d. Any crime that involves
computers and networks
35.
Every activity you perform on the internet
is safe for how long?
a. 1 month
b. 1 year
c.
As per my setting
d. Forever
36.
A is an injury or disorder of muscles, nerves, tendons, ligaments
and joints.
a. Repetitive Strain injury
b. Muscle injury
c.
Nervous breakdown
d.
Joint pain
.
37.
is a technology related
health condition affecting
eyesight.
a. Computer vision strain
b. Computer vision syndrome
c.
Eyesight syndrome
d. Vision imbalance