Related Topics
Take Another Quiz

Cyber Law, Ethics And Intellactual Prop. Law

31 Questions
Law Quizzes & Trivia

Fundamental Knowledge of Cyber law & Intellactual properties law

Questions and Answers
  • 1. 
     General Accepted standards of right and wrong in  a society is called as ......
    • A. 

      Moral

    • B. 

      Ethics

    • C. 

      Guideline

    • D. 

      Code of standard

  • 2. 
    ........... is a criterion used to decide what is right or wrong.
    • A. 

      Moral standard

    • B. 

      Moral principle

    • C. 

      Moral

    • D. 

      Ethics

  • 3. 
    .........indicates rules and regulations to be obeyed in the organization.
    • A. 

      Ethics

    • B. 

      Law

    • C. 

      Moral

    • D. 

      Privacy

  • 4. 
    Code of ethics do not includes............
    • A. 

      Software Piracy

    • B. 

      Fair treatment

    • C. 

      Communication

    • D. 

      Co-operation

  • 5. 
    ............provides norms and principles to the  computer users and system professionals. 
    • A. 

      Code of ethics

    • B. 

      Guidelines

    • C. 

      Privacy

    • D. 

      Security

  • 6. 
    To make the exact copy of a program is termed as.............
    • A. 

      Copyright

    • B. 

      Software privacy

    • C. 

      Fair use

    • D. 

      Law

  • 7. 
    The use of invasive software such as ............... destructs the computer system
    • A. 

      Unselect

    • B. 

      Worms's

    • C. 

      Microbes

    • D. 

      Bacteria

  • 8. 
    When a software is pirated, it harmes...........  
    • A. 

      Management

    • B. 

      Opersator

    • C. 

      People

    • D. 

      Software Developers

  • 9. 
    Accessing data without permission is known as..........
    • A. 

      Illegal Access

    • B. 

      Unauthourized Access

    • C. 

      Legal Access

    • D. 

      Without permission

  • 10. 
    .............. provides legal recognition of tranaction carried out by means of eletronic commerce.
    • A. 

      IT act

    • B. 

      Cyber crime

    • C. 

      Cyber law

    • D. 

      Fair use

  • 11. 
    ..................ensures that the document originated with the person signing it and that was not tampered with after the signature was applied.
    • A. 

      Digital Signature

    • B. 

      Coded Signature

    • C. 

      Double Signature

    • D. 

      Simple Signature

  • 12. 
    .............refers to all the legal and regulatory aspects of internet and world wide web.
    • A. 

      Cyber crime

    • B. 

      Cyber law

    • C. 

      IT act

    • D. 

      Code of standard

  • 13. 
    ..............detects and prevents known viruses which weakens the computer. 
    • A. 

      Web browser

    • B. 

      Email

    • C. 

      Record

    • D. 

      Anti-virus

  • 14. 
    ..................license allows for installation of a program on a software.
    • A. 

      Single User

    • B. 

      Network

    • C. 

      Site

    • D. 

      Lab pack

  • 15. 
    ....................means a representation of information, knowledge, facts, concepts or instructions.  
    • A. 

      Data

    • B. 

      Signature

    • C. 

      Access

    • D. 

      Program

  • 16. 
    ..............means the official Gazette published in the eletronic form.
    • A. 

      Eletronic Gazette

    • B. 

      Eletronic Record

    • C. 

      Eletronic form

    • D. 

      All of above

  • 17. 
    ...................key means the key of a key pair used to create a digital signature.
    • A. 

      Private

    • B. 

      Public

    • C. 

      A and b both

    • D. 

      Security key

  • 18. 
    The legal and regulatory ascepts of intemet refers to.....................
    • A. 

      Cyber law

    • B. 

      Cyber crime

    • C. 

      Criminal law

    • D. 

      IT act

  • 19. 
    Cyber Law is contained in..............
    • A. 

      IT act, 2000

    • B. 

      Negotiable Instrument Act

    • C. 

      Power of Attorney

    • D. 

      Code of ethics

  • 20. 
    ..........include data, text, image, sound, voice, codes, computer programs, software and database. 
    • A. 

      Data

    • B. 

      Information

    • C. 

      Function

    • D. 

      Process

  • 21. 
    To maintain confidentiality of data  and to promote integration of data is called as..........
    • A. 

      Security

    • B. 

      Privacy

    • C. 

      Liability

    • D. 

      Accountability

  • 22. 
    Copyright is...............
    • A. 

      An intelectual property right attached to original works in which the right subsist with him.

    • B. 

      Individuals right to access the information.

    • C. 

      Right of information

    • D. 

      That is not cop[yrightrd software

  • 23. 
    .....................Software allows for anyone to use, copy and distribute it with modifications free of cost. 
    • A. 

      Freeware

    • B. 

      Shareware

    • C. 

      Public domain

    • D. 

      Non freeware

  • 24. 
    Software available onInternet are.......
    • A. 

      Freeware

    • B. 

      Sharewaare

    • C. 

      Public domain

    • D. 

      Nonof these

  • 25. 
    ...........is a distribution method to judge the software whether it is good or bad before you pay for it.
    • A. 

      Shareware

    • B. 

      Freeware

    • C. 

      Non-freeware software

    • D. 

      Public domain software

  • 26. 
    .................... is a discipline that deals with issues in copyright, trademark and patent laws.
    • A. 

      Cyber law

    • B. 

      IT act

    • C. 

      Cyber crime

    • D. 

      Intellectual Property Right

  • 27. 
    ...................laws grant the creator the exclusive rights to reproduce, perform,distribute and display the work publicly.
    • A. 

      Copyright

    • B. 

      Pair use

    • C. 

      Cyber law

    • D. 

      Cyber crime

  • 28. 
    .............gives the protection to original work.
    • A. 

      Accesses

    • B. 

      Address

    • C. 

      User

    • D. 

      Copyright

  • 29. 
    ...............is a leagal use of copyrighted material without explicit permission from the copyrighted holder.
    • A. 

      A copyright

    • B. 

      Unanthourized access

    • C. 

      Property right

    • D. 

      Fairuse

  • 30. 
    Ethics in business ultivate strong..........
    • A. 

      Productivity

    • B. 

      Finance

    • C. 

      Market

    • D. 

      Teamwork

  • 31. 
    Step to step software piracy.............
    • A. 

      Installation Licensed software

    • B. 

      Purchased software without license

    • C. 

      Purchase software with license

    • D. 

      Installing pirated software