Cyber Crimes & Ipr

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Aswathynair18202
A
Aswathynair18202
Community Contributor
Quizzes Created: 1 | Total Attempts: 101
Questions: 10 | Attempts: 101

SettingsSettingsSettings
Cyber Crimes & Ipr - Quiz

Try this


Questions and Answers
  • 1. 

    _______________ are the forms of code or malware programs that can copy themselves and damage or destroy data and systems

    • A.

      Virus

    • B.

      Cyber Crime

    • C.

      Identity Theft

    Correct Answer
    A. Virus
    Explanation
    Viruses are forms of code or malware programs that can replicate themselves and cause harm or destruction to data and computer systems. They can spread from one computer to another, usually through infected files or attachments, and can cause a range of issues such as corrupting files, slowing down computer performance, or even completely disabling a system. Viruses are a common type of cyber threat and can be designed to perform various malicious activities, such as stealing personal information or damaging critical infrastructure.

    Rate this question:

  • 2. 

    ______________________ is a type of social engineering attack often used to steal user data including login credentials,username,password etc…

    • A.

         Hacking  

    • B.

      Phishing

    • C.

      Software Piracy

    Correct Answer
    B. Phishing
    Explanation
    Phishing is a type of social engineering attack where the attacker disguises themselves as a trustworthy entity in order to trick individuals into revealing sensitive information such as login credentials, usernames, passwords, and other personal data. This is typically done through deceptive emails, messages, or websites that appear legitimate, but are actually designed to steal the user's information. Phishing attacks are a common and effective method used by hackers to gain unauthorized access to personal accounts and sensitive data.

    Rate this question:

  • 3. 

    _____________________ is obtaining files that you do not have the right to use from the internet.

    • A.

       Credential theft

    • B.

      Copyright

    • C.

      Illegal downloading

    Correct Answer
    C. Illegal downloading
    Explanation
    Illegal downloading refers to the act of obtaining files from the internet without proper authorization or the right to use them. This can include downloading copyrighted material, such as movies, music, or software, without permission from the copyright holder. It is considered illegal because it infringes upon the rights of the content creators and violates copyright laws.

    Rate this question:

  • 4. 

    A fradulant scheme performed by a dishonest individual,group or company in an attempt to obtain money or something else of value.

    • A.

      Scams   

    • B.

      Child Pornography  

    • C.

      Bullying

    Correct Answer
    A. Scams   
    Explanation
    The correct answer is scams. A scam refers to a fraudulent scheme carried out by dishonest individuals, groups, or companies with the intention of deceiving others and obtaining money or valuable assets. Scammers often use various tactics and manipulations to trick their victims into providing personal information, making financial transactions, or engaging in other activities that benefit the scammer. It is important to be aware of scams and to exercise caution when dealing with unfamiliar individuals or organizations to protect oneself from becoming a victim.

    Rate this question:

  • 5. 

    __________________________ is the scientific processes of identification, acquisition, authentication, analysis, documentation and preservation of digital evidence.

    • A.

        Internet Forensics 

    • B.

      RCCF

    • C.

      Cyber Forensics

    Correct Answer
    C. Cyber Forensics
    Explanation
    Cyber forensics is the scientific process that involves identifying, acquiring, authenticating, analyzing, documenting, and preserving digital evidence. This field focuses on investigating cybercrimes and gathering digital evidence to be used in legal proceedings. It involves techniques and methodologies to extract and analyze data from various digital devices and networks. Through cyber forensics, investigators can uncover valuable information, such as emails, documents, images, and other digital artifacts, that can be crucial in solving cybercrimes and prosecuting offenders.

    Rate this question:

  • 6. 

    ____________________ are legal rights governing the use of creations of human mind

    • A.

      IPR 

    • B.

      CA  

    • C.

      RCF

    Correct Answer
    A. IPR 
    Explanation
    IPR stands for Intellectual Property Rights, which are legal rights governing the use of creations of the human mind. These rights include copyrights, trademarks, patents, and trade secrets, and they protect the rights of creators and inventors by granting them exclusive rights to their creations or inventions. IPR ensures that individuals or organizations have control over the use, distribution, and reproduction of their intellectual property, promoting innovation and creativity while also providing legal protection against infringement or unauthorized use.

    Rate this question:

  • 7. 

    ______________________ data can be freely used,re-used and distributed by anyone.

    • A.

      Universal Data

    • B.

      Open Data

    • C.

      Private Data

    Correct Answer
    B. Open Data
    Explanation
    Open data refers to data that is freely available and can be used, reused, and distributed by anyone. This means that there are no restrictions or limitations on accessing or utilizing the data. Open data promotes transparency, collaboration, and innovation by allowing individuals, organizations, and governments to analyze and utilize the information for various purposes. It enables the development of new applications, research, and insights that can benefit society as a whole.

    Rate this question:

  • 8. 

    ________________________ is a document that provides legally binding guidelines for the use and distribution of software

    • A.

      Software licence 

    • B.

      Apache-Licence

    • C.

      Open Source Software

    Correct Answer
    A. Software licence 
    Explanation
    A software license is a document that provides legally binding guidelines for the use and distribution of software. It outlines the terms and conditions under which the software can be used, including any restrictions or limitations. By obtaining a software license, users are granted permission to use the software in accordance with the specified guidelines, while also ensuring that they are not infringing on any copyright or intellectual property rights.

    Rate this question:

  • 9. 

    ______________________ indicates the terms under which end user may use the software

    • A.

      EULA

    • B.

      GPL

    • C.

      CC

    Correct Answer
    A. EULA
    Explanation
    EULA stands for End User License Agreement and it is a legal contract between the software developer and the end user that outlines the terms and conditions under which the end user can use the software. The EULA typically specifies the rights and restrictions of the end user, such as the number of installations allowed, any limitations on copying or distributing the software, and any disclaimers or limitations of liability. It is important for users to read and understand the EULA before using the software to ensure compliance with the terms.

    Rate this question:

  • 10. 

    Which one of the following is not an objective of IPR

    • A.

      Privatisation

    • B.

      Awareness

    • C.

      Commercialisation

    Correct Answer
    A. Privatisation
    Explanation
    Privatisation is not an objective of Intellectual Property Rights (IPR). IPR aims to protect and promote the rights of creators and innovators by granting them exclusive rights over their creations or inventions. Privatisation, on the other hand, refers to the transfer of ownership or control of a public sector entity to the private sector. While privatisation may have its own benefits, it is not directly related to the objectives of IPR, which primarily focus on the protection and promotion of intellectual property.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 20, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Apr 19, 2020
    Quiz Created by
    Aswathynair18202
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.