/**/ Python & MySQL: Multiple Choice Qestions (2026)

Wednesday, February 11, 2026

Multiple Choice Qestions (2026)


MULTIPLE CHOICE QUESTIONS

 

1.            Online posting of rumours, giving threats online, posting the victim’s personal information, comments aimed to publicly ridicule a victim is termed as                                              

a.   Cyber bullying

b.   Cyber crime

c.   Cyber insult

d.   All of the above

 

2.            Ankit made a ERP - Enterprise resource planning solution for a renowned university and registered and Copyrights for the same. Which of the most important option; Ankit got the copyrights.

a)     To get society status

b)     To get fame

c)     To get community welfare

d)   To secure finance protection



3.           Which of the following is not an example of Social media platform?

a.   Facebook

       b.   Pinterest

c.   Google+

      d.   Social channel

4.           A responsible netizen must abide by                         

      a.   Net etiquettes

      b.   Communication etiquettes

c.   Social media etiquettes

      d.   All of the above

 

5.           A                            is some lines of malicious code that can copy itself and can have detrimental effect on the computers, by destroying data or corrupting the system.

         a.   Cyber crime

         b.   Computer virus

  c.   Program

        d.   Software

 6.            Which of the following activity is an example of leaving Active digital footprints?

a)                 Surfing internet

b)                 Visiting a website

c)                 Sending an email to a friend

d)                 None of the above

 

7.      You are planning to go for a vacation. You surfed the internet to get answers for following queries.

a)                 Places to visit

b)                 Availability of air tickets and fares

c)                 Best hotel deals

d)   All of these



8.  Legal term to describe the rights of a creator of original creative or artistic work is called……..

a)                 Copyright

b)                 Copyleft

c)                 GPL

d)                 BSD

 

9.  Intellectual Property is legally protected through              



a)                 copyright

b)                 patent

c)                 registered trademark

d)                 All of the above

 

10.                                 includes any visual symbol, word, name, design, slogan, label, etc., that distinguishes the brand from other brands.

a)                 Trademark

b)                 Patent

c)                 Copyright

d)                 None of the above

 

11.       Gaining unauthorised access to a network or computer aur digital files with malicious intentions, is

called                    

a.   Cracking

b.   Hacking

c.   Banging

d.   Phishing

 

12.       Legal term to describe the rights of a creator of original creative or artistic work is called


a.   Copyright

b.   Copyleft

c.   GPL

d.   None of these

 

13.       OSS stands for

a.   Open system security

b.   Open system source

c.   Open software and security

d.   Open source software

 

14.       Any fraudulent business practice that extracts money e from an unsuspecting, ignorant person is called                                 

a.   Stealing

b.   Scam

c.   Violation of copyright

d.   Digital footprint

 

15.                         means no price is to be paid for the software.

a.   Free software


b.  
Freeware

c.   shareware

d.   Open source software

 

16.       Any work / information that exist in digital form idea on internet or on an electronic device, is known as      property.

a.   Licence property

b.   digital property

c.   source code property

d.   software property

 

17.       Discarded electrical or or electronic devices are known as                              .

a.   E waste

b.   Software Waste

c.   Hardware waste

d.   Computer waste

 

18.       The least restrictive open sourcelicence is                     licence.

a.   Apache Licence

b.   MIT licence

c.   GNU licence

d.   BSD licence

 

19.   The original code written by programmers for a software is known as                                    

a.   Object code

b.   Source code

c.   Python code

d.   Language code

 

20.                              means freedom to use the software.

a.   Plagiarism

b.   Freeware

c.   Open software

d.   Free software

 

21.   IAD means                                       

a.   Internet advanced data

b.   Internet addiction disorder

c.   Internet advanced digitalization

d.   Internet aggregate data

 

22.   The                       is the Digital trail of your activity on the internet.

a.   Copyleft

b.   Digital footprint


c.  
Digital data

d.   Internet property

 

23.    The                    the are the permissions given to use a product or someone's creator by the copyright holder.

a.   Source code

b.   Licence

c.   Software authority

d.   Digital rights

 

24.                                 is a licence that gives right opposite to copyright.

a.   Left copy

b.   Digital copy

c.   Copyleft

d.   IPR

 

25.   A software that can be freely accessed and modified is called

a.   synchronous software

b.   package software

c.   open source software

d.   middleware.

 

26.   Which of the following is an advantage of open source software?

a.   You can edit the source code to customise it

b.   you need to be an expert to edit code

c.   you have to pay

d.   can sometimes with two generic for specialist purposes.

 

27.   Which of the following is a disadvantage of open source software?

a.   high quality software with lots of features.

b.   not as customizable

c.   may not have been tested as much as proprietary software so might have bugs.

d.   you can added the source code to customize it

 

28.   Which of the following is an advantage of proprietary software?

a.   It is usually free

b.   thoroughly tested because people are paying to use it.

c.   Not as customizable.

d.   Can sometimes be to generate for specialist purposes.

 

29.   Which of the following is a disadvantage of proprietary software?

a.   You need to be an expert to edit code.

b.   You have to pay for this type of software.

c.   It’s licensed.


d.  
It is launched after proper testing.

 

30.    The generally recognized term for the government protection afforded to intellectual property written

and electronic is called                               

a.   Computer security law.

b.   Aggregate information.

c.   Copyright law

d.   Data security standards.

 

31.   Which of the following would be a creative work protected by copyright?

a.   A list of all Indian President names

b.   A Portrait of your family

c.   A song you wrote

d.   The name of your pet dog

 

32.   Which of the following is not done by cyber criminals?

a.   Unauthorised account access

b.   Mass Attack using trojans as botnets

c.   Email spoofing and spamming

d.   report vulnerabilty in any system

 

33.   What is the name of the IT law that India is having in the Indian legislature?

a.   India's Technology IT Act 2000

b.   India's Digital information technology DIT Act, 2000

c.   India's Information Technology IT Act, 2000

d.   The technology act, 2008.

 

34.   What is meant by the term cybercrime?

a.   Any crime that uses computers to jeopardize or attempt to jeoparadise in national security

b.   The use of computer networks to commit financial or identity fraud

c.   The theft of Digital information

d.   Any crime that involves computers and networks

 

35.    Every activity you perform on the internet is safe for how long?

a.   1 month

b.   1 year

c.   As per my setting

d.   Forever

 

36.    A                              is an injury or disorder of muscles, nerves, tendons, ligaments and joints.

a.   Repetitive Strain injury

b.   Muscle injury

c.   Nervous breakdown


d.  
Joint pain

.

37.                                        is a technology related health condition affecting eyesight.

a.   Computer vision strain

b.   Computer vision syndrome

c.   Eyesight syndrome

d.   Vision imbalance 


No comments:

Post a Comment

Please do not any spam in the comment box.

Multiple Choice Qestions (2026)

MULTIPLE CHOICE QUESTIONS   1.             Online posting of rumours, giving threats online, posting the victim’s personal informati...