Cyber Law, Ethics And Intellactual Prop. Law

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Rtjadhav15872
R
Rtjadhav15872
Community Contributor
Quizzes Created: 2 | Total Attempts: 9,581
| Attempts: 7,540 | Questions: 31
Please wait...
Question 1 / 31
0 %
0/100
Score 0/100
1. ..............detects and prevents known viruses which weakens the computer. 

Explanation

An anti-virus software is designed to detect and prevent known viruses that can weaken the computer. It scans files, programs, and websites for any malicious code or patterns that match with known viruses. By identifying and eliminating these viruses, the anti-virus software helps to protect the computer from potential damage or unauthorized access.

Submit
Please wait...
About This Quiz
Cyber Law, Ethics And Intellactual Prop. Law - Quiz

Explore the foundational elements of Cyber Law, Ethics, and Intellectual Property Law through this quiz. Assess your understanding of moral standards, legal frameworks, and ethical codes in technology... see moreand society. Essential for learners in legal, technology, and ethical fields. see less

2. Copyright is...............

Explanation

Copyright is an intellectual property right attached to original works, such as books, music, and artwork. This right allows the creator of the work to have exclusive control over its use and distribution. It protects the creator from unauthorized copying, distributing, or performing their work without their permission. The right subsists with the creator, meaning that they have the sole authority to decide how their work is used and who can benefit from it.

Submit
3. ..................ensures that the document originated with the person signing it and that was not tampered with after the signature was applied.

Explanation

A digital signature ensures that the document originated with the person signing it and that it was not tampered with after the signature was applied. Unlike a simple signature, which can be easily forged or altered, a digital signature uses encryption techniques to securely sign the document and verify its integrity. This provides a higher level of security and authenticity compared to other types of signatures, such as coded, double, or simple signatures.

Submit
4. Cyber Law is contained in..............

Explanation

The correct answer is IT act, 2000. The IT act, 2000 is a law in India that deals with various aspects of cybercrime, electronic commerce, and electronic governance. It provides legal recognition for electronic transactions, digital signatures, and electronic records. The act also defines various cyber offenses and their penalties. Therefore, cyber law is contained in the IT act, 2000.

Submit
5. The legal and regulatory ascepts of intemet refers to.....................

Explanation

The correct answer is cyber law. The legal and regulatory aspects of the internet pertain to the laws and regulations that govern online activities and behavior. Cyber law encompasses a wide range of legal issues related to the internet, such as online privacy, intellectual property rights, electronic transactions, and cybercrime. It establishes guidelines and regulations to ensure that individuals and organizations operate within the legal framework while using the internet.

Submit
6. The use of invasive software such as ............... destructs the computer system

Explanation

The use of invasive software such as worms's can destruct the computer system. Worms are a type of malicious software that can replicate themselves and spread across a network, causing damage to computer systems by consuming system resources, corrupting files, or even disabling the entire system. Therefore, the presence of worms's can lead to the destruction of the computer system.

Submit
7. Accessing data without permission is known as..........

Explanation

The correct answer is "unauthorized Access". This term refers to the act of accessing data or information without proper permission or authorization. It implies that the individual is gaining entry to a system or resource without the necessary rights or privileges. Unauthorized access is considered a violation of security protocols and can lead to legal consequences.

Submit
8. .........indicates rules and regulations to be obeyed in the organization.

Explanation

The term "law" refers to a set of rules and regulations that individuals are required to follow in a particular organization or society. These laws are legally binding and enforceable, often backed by consequences for non-compliance. In the context of the given question, "law" is the correct answer as it accurately represents the concept of rules and regulations that need to be obeyed within an organization.

Submit
9. ....................means a representation of information, knowledge, facts, concepts or instructions.  

Explanation

Data refers to a representation of information, knowledge, facts, concepts, or instructions. It can be in the form of numbers, text, images, or any other format that can be processed and analyzed by a computer or human. Data is crucial for making informed decisions and understanding various phenomena. It serves as the foundation for generating insights and extracting meaningful information.

Submit
10. ...................laws grant the creator the exclusive rights to reproduce, perform,distribute and display the work publicly.

Explanation

Copyright laws grant the creator the exclusive rights to reproduce, perform, distribute, and display their work publicly. These laws protect the original expression of ideas and prevent others from using or copying the work without permission. Copyright is a legal concept that provides creators with the ability to control and profit from their creations, encouraging innovation and creativity. It ensures that creators have the right to determine how their work is used and prevents unauthorized use or exploitation of their intellectual property.

Submit
11. .....................Software allows for anyone to use, copy and distribute it with modifications free of cost. 

Explanation

Freeware refers to software that is available for anyone to use, copy, and distribute with modifications, without any cost. This means that the software is free to download and use, and users have the freedom to modify and distribute it as they wish. Unlike shareware, which often has limitations or requires payment for full functionality, freeware is completely free of charge. Public domain refers to works that are not protected by copyright and are available for public use, but it does not necessarily imply that modifications are allowed. Non-freeware refers to software that is not free and requires payment to use.

Submit
12. .............gives the protection to original work.

Explanation

Copyright gives protection to original work by granting the creator exclusive rights to reproduce, distribute, display, and perform their work. It allows the creator to control how their work is used and prevents others from using or copying it without permission. This protection encourages creativity and innovation by providing legal rights and incentives to creators, ensuring that they can benefit from their creations and have control over their intellectual property.

Submit
13. Code of ethics do not includes............

Explanation

The code of ethics typically outlines a set of moral principles and guidelines that individuals or organizations should adhere to in their professional conduct. Software piracy refers to the unauthorized copying, distribution, or use of copyrighted software, which is illegal and unethical. Therefore, it is reasonable to conclude that software piracy should not be included in the code of ethics as it goes against the principles of fairness, honesty, and respect for intellectual property rights.

Submit
14. When a software is pirated, it harmes...........  

Explanation

When a software is pirated, it harms the software developers. Piracy involves the unauthorized copying, distribution, or use of software, which deprives the developers of their rightful income. It undermines their ability to earn a profit from their hard work and discourages future innovation. Additionally, piracy can lead to a loss of trust in the software industry and can negatively impact job opportunities for developers.

Submit
15.  General Accepted standards of right and wrong in  a society is called as ......

Explanation

The correct answer is "moral" because moral refers to the accepted standards of right and wrong in a society. It encompasses principles and values that guide individuals' behavior and decision-making, based on concepts such as fairness, honesty, and respect for others. Ethics, guidelines, and code of standard may also be related to moral standards, but moral specifically refers to the overall accepted standards in a society.

Submit
16. ..............means the official Gazette published in the eletronic form.

Explanation

The term "eletronic Gazette" refers to the official Gazette that is published in electronic form. This means that instead of being published in print or physical format, the Gazette is made available digitally. Therefore, the answer "eletronic Gazette" accurately describes the official publication in electronic form.

Submit
17. ..........include data, text, image, sound, voice, codes, computer programs, software and database. 

Explanation

The given answer "information" is correct because it encompasses all the mentioned elements such as data, text, image, sound, voice, codes, computer programs, software, and database. Information refers to processed or organized data that has meaning and can be used for decision-making or understanding. It is a broader term that includes various forms of data and content.

Submit
18. .............refers to all the legal and regulatory aspects of internet and world wide web.

Explanation

Cyber law refers to all the legal and regulatory aspects of the internet and the World Wide Web. It encompasses various laws and regulations that govern online activities, such as online transactions, privacy, intellectual property rights, and cybercrime. Cyber law is crucial in ensuring the security and protection of individuals and businesses in the digital space. It covers a wide range of legal issues related to technology and the internet, including electronic contracts, digital signatures, and online defamation. Therefore, cyber law is the correct answer as it encompasses all the legal and regulatory aspects of the internet and the World Wide Web.

Submit
19. ............provides norms and principles to the  computer users and system professionals. 

Explanation

The code of ethics provides norms and principles to computer users and system professionals, guiding their behavior and decision-making in the field. It sets standards for ethical conduct, such as respecting privacy and ensuring security. These guidelines help individuals navigate ethical dilemmas and promote responsible and professional behavior in the use and development of computer systems and technology.

Submit
20. .................... is a discipline that deals with issues in copyright, trademark and patent laws.

Explanation

Intellectual Property Right is the correct answer because it is a discipline that specifically deals with issues related to copyright, trademark, and patent laws. Intellectual property refers to creations of the mind, such as inventions, literary and artistic works, symbols, names, and designs, which are protected by laws. This discipline focuses on protecting and enforcing these rights, ensuring that individuals and businesses have legal ownership and control over their intellectual creations.

Submit
21. To maintain confidentiality of data  and to promote integration of data is called as..........

Explanation

Privacy refers to the protection of personal information and the right to control how it is collected, used, and shared. It ensures that sensitive data is kept confidential and not accessed by unauthorized individuals. Privacy also promotes the integration of data by establishing trust and confidence among individuals and organizations, encouraging them to share information without fear of misuse or breach.

Submit
22. ........... is a criterion used to decide what is right or wrong.

Explanation

A moral standard is a criterion used to determine whether an action or behavior is right or wrong. It serves as a guideline or rule that individuals or societies use to evaluate their actions and make moral judgments. Moral standards are often based on cultural, religious, or personal beliefs and values. They provide a framework for ethical decision-making and help individuals navigate moral dilemmas by providing a standard against which actions can be measured.

Submit
23. ...................key means the key of a key pair used to create a digital signature.

Explanation

The correct answer is "private". In the context of creating a digital signature, a key pair is used, consisting of a private key and a public key. The private key is kept secret and is used to generate the digital signature, while the public key is shared with others to verify the authenticity of the signature. Therefore, the private key is the key of the key pair used to create a digital signature.

Submit
24. .............. provides legal recognition of tranaction carried out by means of eletronic commerce.

Explanation

Cyber law refers to the legal framework that governs electronic commerce and transactions conducted online. It provides legal recognition and validity to transactions carried out through electronic means, ensuring that they are legally binding and enforceable. Cyber law encompasses various aspects such as electronic contracts, digital signatures, online privacy, intellectual property rights, and cybercrime prevention. It aims to regulate and protect individuals, businesses, and organizations engaged in electronic commerce, ensuring a secure and trustworthy environment for online transactions.

Submit
25. ..................license allows for installation of a program on a software.

Explanation

A network license allows for the installation of a program on multiple computers within a network. This means that multiple users can access and use the program simultaneously from different computers connected to the same network. It provides flexibility and cost-effectiveness for organizations that require multiple users to access the software.

Submit
26. To make the exact copy of a program is termed as.............

Explanation

The term "software privacy" refers to the protection of software from unauthorized access, use, or distribution. Making an exact copy of a program without permission would violate the software's privacy rights. Therefore, the correct answer is software privacy.

Submit
27. Software available onInternet are.......

Explanation

Public domain refers to software that is not protected by copyright and is freely available for anyone to use, modify, and distribute. This means that the software can be accessed and used by anyone without any restrictions or limitations. Unlike freeware and shareware, public domain software does not require any payment or licensing fees. Therefore, the correct answer is public domain.

Submit
28. ...............is a leagal use of copyrighted material without explicit permission from the copyrighted holder.

Explanation

Fair use is a legal principle that allows limited use of copyrighted material without the need for explicit permission from the copyright holder. It allows for the use of copyrighted material for purposes such as criticism, comment, news reporting, teaching, scholarship, or research. Fair use is an exception to copyright law and is intended to balance the rights of the copyright holder with the public's interest in accessing and using copyrighted works.

Submit
29. ...........is a distribution method to judge the software whether it is good or bad before you pay for it.

Explanation

Freeware refers to software that is available for use at no cost. It allows users to judge the software's quality and functionality before making any payment. This distribution method is commonly used to provide software for personal use, allowing individuals to try out the software and decide if they want to continue using it without any financial commitment.

Submit
30. Ethics in business ultivate strong..........

Explanation

Ethics in business cultivate strong productivity and teamwork. When a company operates with ethical principles, employees are more likely to feel valued and motivated, leading to increased productivity. Ethical behavior also fosters a positive work environment, encouraging teamwork and collaboration among employees. By prioritizing ethics, businesses can create a culture that promotes both individual and collective success, ultimately driving productivity and fostering effective teamwork.

Submit
31. Step to step software piracy.............

Explanation

The given correct answer suggests that the step-by-step process of software piracy involves first installing licensed software, then purchasing software without a license, and finally installing pirated software. This implies that individuals initially start by using legitimate licensed software, but then choose to acquire software without obtaining the necessary licenses, leading to the installation of pirated versions.

Submit
View My Results

Quiz Review Timeline (Updated): Mar 22, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 22, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Feb 18, 2010
    Quiz Created by
    Rtjadhav15872
Cancel
  • All
    All (31)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
..............detects and prevents known viruses which weakens the...
Copyright is...............
..................ensures that the document originated with the person...
Cyber Law is contained in..............
The legal and regulatory ascepts of intemet refers...
The use of invasive software such as ............... destructs the...
Accessing data without permission is known as..........
.........indicates rules and regulations to be obeyed in the...
....................means a representation of information, knowledge,...
...................laws grant the creator the exclusive rights to...
.....................Software allows for anyone to use, copy and...
.............gives the protection to original work.
Code of ethics do not includes............
When a software is pirated, it harmes...........  
 General Accepted standards of right and wrong in  a society...
..............means the official Gazette published in the eletronic...
..........include data, text, image, sound, voice, codes, computer...
.............refers to all the legal and regulatory aspects of...
............provides norms and principles to the  computer users...
.................... is a discipline that deals with issues in...
To maintain confidentiality of data  and to promote...
........... is a criterion used to decide what is right or wrong.
...................key means the key of a key pair used to create a...
.............. provides legal recognition of tranaction carried out by...
..................license allows for installation of a program on a...
To make the exact copy of a program is termed as.............
Software available onInternet are.......
...............is a leagal use of copyrighted material without...
...........is a distribution method to judge the software whether it...
Ethics in business ultivate strong..........
Step to step software piracy.............
Alert!

Advertisement