Cyber Law, Ethics And Intellactual Prop. Law

31 Questions  I  By Rtjadhav15872
Please take the quiz to rate it.

Law Quizzes & Trivia
Fundamental Knowledge of Cyber law & Intellactual properties law

  
Changes are done, please start the quiz.


Questions and Answers

Removing question excerpt is a premium feature

Upgrade and get a lot more done!
  • 1. 
     General Accepted standards of right and wrong in  a society is called as ......
    • A. 

      Moral

    • B. 

      Ethics

    • C. 

      Guideline

    • D. 

      Code of standard


  • 2. 
    ........... is a criterion used to decide what is right or wrong.
    • A. 

      Moral standard

    • B. 

      Moral principle

    • C. 

      Moral

    • D. 

      Ethics


  • 3. 
    .........indicates rules and regulations to be obeyed in the organization.
    • A. 

      Ethics

    • B. 

      Law

    • C. 

      Moral

    • D. 

      Privacy


  • 4. 
    Code of ethics do not includes............
    • A. 

      Software Piracy

    • B. 

      Fair treatment

    • C. 

      Communication

    • D. 

      Co-operation


  • 5. 
    ............provides norms and principles to the  computer users and system professionals. 
    • A. 

      Code of ethics

    • B. 

      Guidelines

    • C. 

      Privacy

    • D. 

      Security


  • 6. 
    To make the exact copy of a program is termed as.............
    • A. 

      Copyright

    • B. 

      Software privacy

    • C. 

      Fair use

    • D. 

      Law


  • 7. 
    The use of invasive software such as ............... destructs the computer system
    • A. 

      Unselect

    • B. 

      Worms's

    • C. 

      Microbes

    • D. 

      Bacteria


  • 8. 
    When a software is pirated, it harmes...........  
    • A. 

      Management

    • B. 

      Opersator

    • C. 

      People

    • D. 

      Software Developers


  • 9. 
    Accessing data without permission is known as..........
    • A. 

      Illegal Access

    • B. 

      Unauthourized Access

    • C. 

      Legal Access

    • D. 

      Without permission


  • 10. 
    .............. provides legal recognition of tranaction carried out by means of eletronic commerce.
    • A. 

      IT act

    • B. 

      Cyber crime

    • C. 

      Cyber law

    • D. 

      Fair use


  • 11. 
    ..................ensures that the document originated with the person signing it and that was not tampered with after the signature was applied.
    • A. 

      Digital Signature

    • B. 

      Coded Signature

    • C. 

      Double Signature

    • D. 

      Simple Signature


  • 12. 
    .............refers to all the legal and regulatory aspects of internet and world wide web.
    • A. 

      Cyber crime

    • B. 

      Cyber law

    • C. 

      IT act

    • D. 

      Code of standard


  • 13. 
    ..............detects and prevents known viruses which weakens the computer. 
    • A. 

      Web browser

    • B. 

      Email

    • C. 

      Record

    • D. 

      Anti-virus


  • 14. 
    ..................license allows for installation of a program on a software.
    • A. 

      Single User

    • B. 

      Network

    • C. 

      Site

    • D. 

      Lab pack


  • 15. 
    ....................means a representation of information, knowledge, facts, concepts or instructions.  
    • A. 

      Data

    • B. 

      Signature

    • C. 

      Access

    • D. 

      Program


  • 16. 
    ..............means the official Gazette published in the eletronic form.
    • A. 

      Eletronic Gazette

    • B. 

      Eletronic Record

    • C. 

      Eletronic form

    • D. 

      All of above


  • 17. 
    ...................key means the key of a key pair used to create a digital signature.
    • A. 

      Private

    • B. 

      Public

    • C. 

      A and b both

    • D. 

      Security key


  • 18. 
    The legal and regulatory ascepts of intemet refers to.....................
    • A. 

      Cyber law

    • B. 

      Cyber crime

    • C. 

      Criminal law

    • D. 

      IT act


  • 19. 
    Cyber Law is contained in..............
    • A. 

      IT act, 2000

    • B. 

      Negotiable Instrument Act

    • C. 

      Power of Attorney

    • D. 

      Code of ethics


  • 20. 
    ..........include data, text, image, sound, voice, codes, computer programs, software and database. 
    • A. 

      Data

    • B. 

      Information

    • C. 

      Function

    • D. 

      Process


  • 21. 
    To maintain confidentiality of data  and to promote integration of data is called as..........
    • A. 

      Security

    • B. 

      Privacy

    • C. 

      Liability

    • D. 

      Accountability


  • 22. 
    Copyright is...............
    • A. 

      An intelectual property right attached to original works in which the right subsist with him.

    • B. 

      Individuals right to access the information.

    • C. 

      Right of information

    • D. 

      That is not cop[yrightrd software


  • 23. 
    .....................Software allows for anyone to use, copy and distribute it with modifications free of cost. 
    • A. 

      Freeware

    • B. 

      Shareware

    • C. 

      Public domain

    • D. 

      Non freeware


  • 24. 
    Software available onInternet are.......
    • A. 

      Freeware

    • B. 

      Sharewaare

    • C. 

      Public domain

    • D. 

      Nonof these


  • 25. 
    ...........is a distribution method to judge the software whether it is good or bad before you pay for it.
    • A. 

      Shareware

    • B. 

      Freeware

    • C. 

      Non-freeware software

    • D. 

      Public domain software


  • 26. 
    .................... is a discipline that deals with issues in copyright, trademark and patent laws.
    • A. 

      Cyber law

    • B. 

      IT act

    • C. 

      Cyber crime

    • D. 

      Intellectual Property Right


  • 27. 
    ...................laws grant the creator the exclusive rights to reproduce, perform,distribute and display the work publicly.
    • A. 

      Copyright

    • B. 

      Pair use

    • C. 

      Cyber law

    • D. 

      Cyber crime


  • 28. 
    .............gives the protection to original work.
    • A. 

      Accesses

    • B. 

      Address

    • C. 

      User

    • D. 

      Copyright


  • 29. 
    ...............is a leagal use of copyrighted material without explicit permission from the copyrighted holder.
    • A. 

      A copyright

    • B. 

      Unanthourized access

    • C. 

      Property right

    • D. 

      Fairuse


  • 30. 
    Ethics in business ultivate strong..........
    • A. 

      Productivity

    • B. 

      Finance

    • C. 

      Market

    • D. 

      Teamwork


  • 31. 
    Step to step software piracy.............
    • A. 

      Installation Licensed software

    • B. 

      Purchased software without license

    • C. 

      Purchase software with license

    • D. 

      Installing pirated software


Back to top

Removing ad is a premium feature

Upgrade and get a lot more done!
Take Another Quiz
We have sent an email with your new password.