1. World Computer Security Day:
[a] October 30
[b] November 30
[c] December 30
[d] January 30
2. Many cyber crimes come under the Indian Penal Code. Which one of the following is an example?
[a] Sending threatening messages by email
[b] Forgery of electronic records
[c] Bogus websites
[d] All of these
3. Information Technology Act, 2000 made amendment to which of the following existing laws?
[a] Indian Penal Code
[b] Indian Evidence Act
[c] Bankers Book Evidence Act
[d] All of these
4. A ____ is a set of exclusive rights granted by a state to an inventor or his assignee for a limited period of time in exchange for a disclosure of an invention:
[a] Copyright
[b] Blog
[c] Patent
[d] Trademark
5. ____ gives the author of an original work exclusive right for a certain time period in relation to that work, including its publication, distribution and adaptation:
[a] Copyright
[b] Copy left
[c] Patent
[d] Trademark
6. The rental of software to consumers without the permission of the copyright holder known as
[a] Unbundling
[b] Renting
[c] Counter Felting
[d] Soft loading
7. Copying the materials published on the internet as one’s own without proper acknowledgement is called _____:
[a] Internet Plagiarism
[b] Internet reference
[c] Internet surfing
[d] Internet publishing
8. Any criminal activity that uses a computer either as an instrumentality, target or a means for perpetuating further crimes comes within the ambit
of:
[a] Software Piracy
[b] Cyber Crime
[c] Conventional Crime
[d] None of these
9. _______ are a bundle of exclusive rights over creations of the mind, both artistic and commercial:
[a] Intellectual property rights
[b] Copyright
[c] Patent
[d] Trademark
10. Which of the following come under cyber crime?
[a] Intellectual Property Crime
[b] Pornography
[c] Online Gambling
[d] All the above
11. Under the I.T. Act, whoever commits or conspires to commit cyber terrorism shall be punishable with imprisonment which may extend to ____.
[a] two years
[b] five years
[c] ten years
[d] imprisonment for life
12. An unauthorized program which functions from inside what seems to be an authorized program, thereby concealing what it is actually doing:
[a] Trojan Horse
[b] Voyeur
[c] Diddling
[d] Spamming
13. As per the IT (Amendment) Act 2008, Tampering with Computer Source Documents shall be punishable with imprisonment up to years, or with fine which may extend up to _____rupees, or with both.
[a] two lakh
[b] three lakh
[c] four lakh
[d] five lakh
14. Which of the following is a cyber crime against individual?
[a] Email spoofing
[b] Cyber Defamation
[c] Cyber stalking
[d] All of these
15. The first cyber police station in Kerala was inagurated in:
[a] 2009
[b] 2010
[c] 2011
[d] 2012
[a] October 30
[b] November 30
[c] December 30
[d] January 30
2. Many cyber crimes come under the Indian Penal Code. Which one of the following is an example?
[a] Sending threatening messages by email
[b] Forgery of electronic records
[c] Bogus websites
[d] All of these
3. Information Technology Act, 2000 made amendment to which of the following existing laws?
[a] Indian Penal Code
[b] Indian Evidence Act
[c] Bankers Book Evidence Act
[d] All of these
4. A ____ is a set of exclusive rights granted by a state to an inventor or his assignee for a limited period of time in exchange for a disclosure of an invention:
[a] Copyright
[b] Blog
[c] Patent
[d] Trademark
5. ____ gives the author of an original work exclusive right for a certain time period in relation to that work, including its publication, distribution and adaptation:
[a] Copyright
[b] Copy left
[c] Patent
[d] Trademark
6. The rental of software to consumers without the permission of the copyright holder known as
[a] Unbundling
[b] Renting
[c] Counter Felting
[d] Soft loading
7. Copying the materials published on the internet as one’s own without proper acknowledgement is called _____:
[a] Internet Plagiarism
[b] Internet reference
[c] Internet surfing
[d] Internet publishing
8. Any criminal activity that uses a computer either as an instrumentality, target or a means for perpetuating further crimes comes within the ambit
of:
[a] Software Piracy
[b] Cyber Crime
[c] Conventional Crime
[d] None of these
9. _______ are a bundle of exclusive rights over creations of the mind, both artistic and commercial:
[a] Intellectual property rights
[b] Copyright
[c] Patent
[d] Trademark
10. Which of the following come under cyber crime?
[a] Intellectual Property Crime
[b] Pornography
[c] Online Gambling
[d] All the above
11. Under the I.T. Act, whoever commits or conspires to commit cyber terrorism shall be punishable with imprisonment which may extend to ____.
[a] two years
[b] five years
[c] ten years
[d] imprisonment for life
12. An unauthorized program which functions from inside what seems to be an authorized program, thereby concealing what it is actually doing:
[a] Trojan Horse
[b] Voyeur
[c] Diddling
[d] Spamming
13. As per the IT (Amendment) Act 2008, Tampering with Computer Source Documents shall be punishable with imprisonment up to years, or with fine which may extend up to _____rupees, or with both.
[a] two lakh
[b] three lakh
[c] four lakh
[d] five lakh
14. Which of the following is a cyber crime against individual?
[a] Email spoofing
[b] Cyber Defamation
[c] Cyber stalking
[d] All of these
15. The first cyber police station in Kerala was inagurated in:
[a] 2009
[b] 2010
[c] 2011
[d] 2012
0 Comments