Cyber Law, Ethics And Intellactual Prop. Law

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Rtjadhav15872
R
Rtjadhav15872
Community Contributor
Quizzes Created: 2 | Total Attempts: 9,363
Questions: 31 | Attempts: 7,473

SettingsSettingsSettings
Cyber Law, Ethics And Intellactual Prop. Law - Quiz

Fundamental Knowledge of Cyber law & Intellactual properties law


Questions and Answers
  • 1. 

     General Accepted standards of right and wrong in  a society is called as ......

    • A.

      Moral

    • B.

      Ethics

    • C.

      Guideline

    • D.

      Code of standard

    Correct Answer
    A. Moral
    Explanation
    The correct answer is "moral" because moral refers to the accepted standards of right and wrong in a society. It encompasses principles and values that guide individuals' behavior and decision-making, based on concepts such as fairness, honesty, and respect for others. Ethics, guidelines, and code of standard may also be related to moral standards, but moral specifically refers to the overall accepted standards in a society.

    Rate this question:

  • 2. 

    ........... is a criterion used to decide what is right or wrong.

    • A.

      Moral standard

    • B.

      Moral principle

    • C.

      Moral

    • D.

      Ethics

    Correct Answer
    A. Moral standard
    Explanation
    A moral standard is a criterion used to determine whether an action or behavior is right or wrong. It serves as a guideline or rule that individuals or societies use to evaluate their actions and make moral judgments. Moral standards are often based on cultural, religious, or personal beliefs and values. They provide a framework for ethical decision-making and help individuals navigate moral dilemmas by providing a standard against which actions can be measured.

    Rate this question:

  • 3. 

    .........indicates rules and regulations to be obeyed in the organization.

    • A.

      Ethics

    • B.

      Law

    • C.

      Moral

    • D.

      Privacy

    Correct Answer
    B. Law
    Explanation
    The term "law" refers to a set of rules and regulations that individuals are required to follow in a particular organization or society. These laws are legally binding and enforceable, often backed by consequences for non-compliance. In the context of the given question, "law" is the correct answer as it accurately represents the concept of rules and regulations that need to be obeyed within an organization.

    Rate this question:

  • 4. 

    Code of ethics do not includes............

    • A.

      Software Piracy

    • B.

      Fair treatment

    • C.

      Communication

    • D.

      Co-operation

    Correct Answer
    A. Software Piracy
    Explanation
    The code of ethics typically outlines a set of moral principles and guidelines that individuals or organizations should adhere to in their professional conduct. Software piracy refers to the unauthorized copying, distribution, or use of copyrighted software, which is illegal and unethical. Therefore, it is reasonable to conclude that software piracy should not be included in the code of ethics as it goes against the principles of fairness, honesty, and respect for intellectual property rights.

    Rate this question:

  • 5. 

    ............provides norms and principles to the  computer users and system professionals. 

    • A.

      Code of ethics

    • B.

      Guidelines

    • C.

      Privacy

    • D.

      Security

    Correct Answer
    A. Code of ethics
    Explanation
    The code of ethics provides norms and principles to computer users and system professionals, guiding their behavior and decision-making in the field. It sets standards for ethical conduct, such as respecting privacy and ensuring security. These guidelines help individuals navigate ethical dilemmas and promote responsible and professional behavior in the use and development of computer systems and technology.

    Rate this question:

  • 6. 

    To make the exact copy of a program is termed as.............

    • A.

      Copyright

    • B.

      Software privacy

    • C.

      Fair use

    • D.

      Law

    Correct Answer
    B. Software privacy
    Explanation
    The term "software privacy" refers to the protection of software from unauthorized access, use, or distribution. Making an exact copy of a program without permission would violate the software's privacy rights. Therefore, the correct answer is software privacy.

    Rate this question:

  • 7. 

    The use of invasive software such as ............... destructs the computer system

    • A.

      Unselect

    • B.

      Worms's

    • C.

      Microbes

    • D.

      Bacteria

    Correct Answer
    B. Worms's
    Explanation
    The use of invasive software such as worms's can destruct the computer system. Worms are a type of malicious software that can replicate themselves and spread across a network, causing damage to computer systems by consuming system resources, corrupting files, or even disabling the entire system. Therefore, the presence of worms's can lead to the destruction of the computer system.

    Rate this question:

  • 8. 

    When a software is pirated, it harmes...........  

    • A.

      Management

    • B.

      Opersator

    • C.

      People

    • D.

      Software Developers

    Correct Answer
    D. Software Developers
    Explanation
    When a software is pirated, it harms the software developers. Piracy involves the unauthorized copying, distribution, or use of software, which deprives the developers of their rightful income. It undermines their ability to earn a profit from their hard work and discourages future innovation. Additionally, piracy can lead to a loss of trust in the software industry and can negatively impact job opportunities for developers.

    Rate this question:

  • 9. 

    Accessing data without permission is known as..........

    • A.

      Illegal Access

    • B.

      Unauthourized Access

    • C.

      Legal Access

    • D.

      Without permission

    Correct Answer
    B. Unauthourized Access
    Explanation
    The correct answer is "unauthorized Access". This term refers to the act of accessing data or information without proper permission or authorization. It implies that the individual is gaining entry to a system or resource without the necessary rights or privileges. Unauthorized access is considered a violation of security protocols and can lead to legal consequences.

    Rate this question:

  • 10. 

    .............. provides legal recognition of tranaction carried out by means of eletronic commerce.

    • A.

      IT act

    • B.

      Cyber crime

    • C.

      Cyber law

    • D.

      Fair use

    Correct Answer
    C. Cyber law
    Explanation
    Cyber law refers to the legal framework that governs electronic commerce and transactions conducted online. It provides legal recognition and validity to transactions carried out through electronic means, ensuring that they are legally binding and enforceable. Cyber law encompasses various aspects such as electronic contracts, digital signatures, online privacy, intellectual property rights, and cybercrime prevention. It aims to regulate and protect individuals, businesses, and organizations engaged in electronic commerce, ensuring a secure and trustworthy environment for online transactions.

    Rate this question:

  • 11. 

    ..................ensures that the document originated with the person signing it and that was not tampered with after the signature was applied.

    • A.

      Digital Signature

    • B.

      Coded Signature

    • C.

      Double Signature

    • D.

      Simple Signature

    Correct Answer
    A. Digital Signature
    Explanation
    A digital signature ensures that the document originated with the person signing it and that it was not tampered with after the signature was applied. Unlike a simple signature, which can be easily forged or altered, a digital signature uses encryption techniques to securely sign the document and verify its integrity. This provides a higher level of security and authenticity compared to other types of signatures, such as coded, double, or simple signatures.

    Rate this question:

  • 12. 

    .............refers to all the legal and regulatory aspects of internet and world wide web.

    • A.

      Cyber crime

    • B.

      Cyber law

    • C.

      IT act

    • D.

      Code of standard

    Correct Answer
    B. Cyber law
    Explanation
    Cyber law refers to all the legal and regulatory aspects of the internet and the World Wide Web. It encompasses various laws and regulations that govern online activities, such as online transactions, privacy, intellectual property rights, and cybercrime. Cyber law is crucial in ensuring the security and protection of individuals and businesses in the digital space. It covers a wide range of legal issues related to technology and the internet, including electronic contracts, digital signatures, and online defamation. Therefore, cyber law is the correct answer as it encompasses all the legal and regulatory aspects of the internet and the World Wide Web.

    Rate this question:

  • 13. 

    ..............detects and prevents known viruses which weakens the computer. 

    • A.

      Web browser

    • B.

      Email

    • C.

      Record

    • D.

      Anti-virus

    Correct Answer
    D. Anti-virus
    Explanation
    An anti-virus software is designed to detect and prevent known viruses that can weaken the computer. It scans files, programs, and websites for any malicious code or patterns that match with known viruses. By identifying and eliminating these viruses, the anti-virus software helps to protect the computer from potential damage or unauthorized access.

    Rate this question:

  • 14. 

    ..................license allows for installation of a program on a software.

    • A.

      Single User

    • B.

      Network

    • C.

      Site

    • D.

      Lab pack

    Correct Answer
    B. Network
    Explanation
    A network license allows for the installation of a program on multiple computers within a network. This means that multiple users can access and use the program simultaneously from different computers connected to the same network. It provides flexibility and cost-effectiveness for organizations that require multiple users to access the software.

    Rate this question:

  • 15. 

    ....................means a representation of information, knowledge, facts, concepts or instructions.  

    • A.

      Data

    • B.

      Signature

    • C.

      Access

    • D.

      Program

    Correct Answer
    A. Data
    Explanation
    Data refers to a representation of information, knowledge, facts, concepts, or instructions. It can be in the form of numbers, text, images, or any other format that can be processed and analyzed by a computer or human. Data is crucial for making informed decisions and understanding various phenomena. It serves as the foundation for generating insights and extracting meaningful information.

    Rate this question:

  • 16. 

    ..............means the official Gazette published in the eletronic form.

    • A.

      Eletronic Gazette

    • B.

      Eletronic Record

    • C.

      Eletronic form

    • D.

      All of above

    Correct Answer
    A. Eletronic Gazette
    Explanation
    The term "eletronic Gazette" refers to the official Gazette that is published in electronic form. This means that instead of being published in print or physical format, the Gazette is made available digitally. Therefore, the answer "eletronic Gazette" accurately describes the official publication in electronic form.

    Rate this question:

  • 17. 

    ...................key means the key of a key pair used to create a digital signature.

    • A.

      Private

    • B.

      Public

    • C.

      A and b both

    • D.

      Security key

    Correct Answer
    A. Private
    Explanation
    The correct answer is "private". In the context of creating a digital signature, a key pair is used, consisting of a private key and a public key. The private key is kept secret and is used to generate the digital signature, while the public key is shared with others to verify the authenticity of the signature. Therefore, the private key is the key of the key pair used to create a digital signature.

    Rate this question:

  • 18. 

    The legal and regulatory ascepts of intemet refers to.....................

    • A.

      Cyber law

    • B.

      Cyber crime

    • C.

      Criminal law

    • D.

      IT act

    Correct Answer
    A. Cyber law
    Explanation
    The correct answer is cyber law. The legal and regulatory aspects of the internet pertain to the laws and regulations that govern online activities and behavior. Cyber law encompasses a wide range of legal issues related to the internet, such as online privacy, intellectual property rights, electronic transactions, and cybercrime. It establishes guidelines and regulations to ensure that individuals and organizations operate within the legal framework while using the internet.

    Rate this question:

  • 19. 

    Cyber Law is contained in..............

    • A.

      IT act, 2000

    • B.

      Negotiable Instrument Act

    • C.

      Power of Attorney

    • D.

      Code of ethics

    Correct Answer
    A. IT act, 2000
    Explanation
    The correct answer is IT act, 2000. The IT act, 2000 is a law in India that deals with various aspects of cybercrime, electronic commerce, and electronic governance. It provides legal recognition for electronic transactions, digital signatures, and electronic records. The act also defines various cyber offenses and their penalties. Therefore, cyber law is contained in the IT act, 2000.

    Rate this question:

  • 20. 

    ..........include data, text, image, sound, voice, codes, computer programs, software and database. 

    • A.

      Data

    • B.

      Information

    • C.

      Function

    • D.

      Process

    Correct Answer
    B. Information
    Explanation
    The given answer "information" is correct because it encompasses all the mentioned elements such as data, text, image, sound, voice, codes, computer programs, software, and database. Information refers to processed or organized data that has meaning and can be used for decision-making or understanding. It is a broader term that includes various forms of data and content.

    Rate this question:

  • 21. 

    To maintain confidentiality of data  and to promote integration of data is called as..........

    • A.

      Security

    • B.

      Privacy

    • C.

      Liability

    • D.

      Accountability

    Correct Answer
    B. Privacy
    Explanation
    Privacy refers to the protection of personal information and the right to control how it is collected, used, and shared. It ensures that sensitive data is kept confidential and not accessed by unauthorized individuals. Privacy also promotes the integration of data by establishing trust and confidence among individuals and organizations, encouraging them to share information without fear of misuse or breach.

    Rate this question:

  • 22. 

    Copyright is...............

    • A.

      An intelectual property right attached to original works in which the right subsist with him.

    • B.

      Individuals right to access the information.

    • C.

      Right of information

    • D.

      That is not cop[yrightrd software

    Correct Answer
    A. An intelectual property right attached to original works in which the right subsist with him.
    Explanation
    Copyright is an intellectual property right attached to original works, such as books, music, and artwork. This right allows the creator of the work to have exclusive control over its use and distribution. It protects the creator from unauthorized copying, distributing, or performing their work without their permission. The right subsists with the creator, meaning that they have the sole authority to decide how their work is used and who can benefit from it.

    Rate this question:

  • 23. 

    .....................Software allows for anyone to use, copy and distribute it with modifications free of cost. 

    • A.

      Freeware

    • B.

      Shareware

    • C.

      Public domain

    • D.

      Non freeware

    Correct Answer
    A. Freeware
    Explanation
    Freeware refers to software that is available for anyone to use, copy, and distribute with modifications, without any cost. This means that the software is free to download and use, and users have the freedom to modify and distribute it as they wish. Unlike shareware, which often has limitations or requires payment for full functionality, freeware is completely free of charge. Public domain refers to works that are not protected by copyright and are available for public use, but it does not necessarily imply that modifications are allowed. Non-freeware refers to software that is not free and requires payment to use.

    Rate this question:

  • 24. 

    Software available onInternet are.......

    • A.

      Freeware

    • B.

      Sharewaare

    • C.

      Public domain

    • D.

      Nonof these

    Correct Answer
    C. Public domain
    Explanation
    Public domain refers to software that is not protected by copyright and is freely available for anyone to use, modify, and distribute. This means that the software can be accessed and used by anyone without any restrictions or limitations. Unlike freeware and shareware, public domain software does not require any payment or licensing fees. Therefore, the correct answer is public domain.

    Rate this question:

  • 25. 

    ...........is a distribution method to judge the software whether it is good or bad before you pay for it.

    • A.

      Shareware

    • B.

      Freeware

    • C.

      Non-freeware software

    • D.

      Public domain software

    Correct Answer
    B. Freeware
    Explanation
    Freeware refers to software that is available for use at no cost. It allows users to judge the software's quality and functionality before making any payment. This distribution method is commonly used to provide software for personal use, allowing individuals to try out the software and decide if they want to continue using it without any financial commitment.

    Rate this question:

  • 26. 

    .................... is a discipline that deals with issues in copyright, trademark and patent laws.

    • A.

      Cyber law

    • B.

      IT act

    • C.

      Cyber crime

    • D.

      Intellectual Property Right

    Correct Answer
    D. Intellectual Property Right
    Explanation
    Intellectual Property Right is the correct answer because it is a discipline that specifically deals with issues related to copyright, trademark, and patent laws. Intellectual property refers to creations of the mind, such as inventions, literary and artistic works, symbols, names, and designs, which are protected by laws. This discipline focuses on protecting and enforcing these rights, ensuring that individuals and businesses have legal ownership and control over their intellectual creations.

    Rate this question:

  • 27. 

    ...................laws grant the creator the exclusive rights to reproduce, perform,distribute and display the work publicly.

    • A.

      Copyright

    • B.

      Pair use

    • C.

      Cyber law

    • D.

      Cyber crime

    Correct Answer
    A. Copyright
    Explanation
    Copyright laws grant the creator the exclusive rights to reproduce, perform, distribute, and display their work publicly. These laws protect the original expression of ideas and prevent others from using or copying the work without permission. Copyright is a legal concept that provides creators with the ability to control and profit from their creations, encouraging innovation and creativity. It ensures that creators have the right to determine how their work is used and prevents unauthorized use or exploitation of their intellectual property.

    Rate this question:

  • 28. 

    .............gives the protection to original work.

    • A.

      Accesses

    • B.

      Address

    • C.

      User

    • D.

      Copyright

    Correct Answer
    D. Copyright
    Explanation
    Copyright gives protection to original work by granting the creator exclusive rights to reproduce, distribute, display, and perform their work. It allows the creator to control how their work is used and prevents others from using or copying it without permission. This protection encourages creativity and innovation by providing legal rights and incentives to creators, ensuring that they can benefit from their creations and have control over their intellectual property.

    Rate this question:

  • 29. 

    ...............is a leagal use of copyrighted material without explicit permission from the copyrighted holder.

    • A.

      A copyright

    • B.

      Unanthourized access

    • C.

      Property right

    • D.

      Fairuse

    Correct Answer
    D. Fairuse
    Explanation
    Fair use is a legal principle that allows limited use of copyrighted material without the need for explicit permission from the copyright holder. It allows for the use of copyrighted material for purposes such as criticism, comment, news reporting, teaching, scholarship, or research. Fair use is an exception to copyright law and is intended to balance the rights of the copyright holder with the public's interest in accessing and using copyrighted works.

    Rate this question:

  • 30. 

    Ethics in business ultivate strong..........

    • A.

      Productivity

    • B.

      Finance

    • C.

      Market

    • D.

      Teamwork

    Correct Answer(s)
    A. Productivity
    D. Teamwork
    Explanation
    Ethics in business cultivate strong productivity and teamwork. When a company operates with ethical principles, employees are more likely to feel valued and motivated, leading to increased productivity. Ethical behavior also fosters a positive work environment, encouraging teamwork and collaboration among employees. By prioritizing ethics, businesses can create a culture that promotes both individual and collective success, ultimately driving productivity and fostering effective teamwork.

    Rate this question:

  • 31. 

    Step to step software piracy.............

    • A.

      Installation Licensed software

    • B.

      Purchased software without license

    • C.

      Purchase software with license

    • D.

      Installing pirated software

    Correct Answer(s)
    A. Installation Licensed software
    B. Purchased software without license
    Explanation
    The given correct answer suggests that the step-by-step process of software piracy involves first installing licensed software, then purchasing software without a license, and finally installing pirated software. This implies that individuals initially start by using legitimate licensed software, but then choose to acquire software without obtaining the necessary licenses, leading to the installation of pirated versions.

    Rate this question:

Related Topics

Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.