SECTION 1:OBJECTIVE TYPE QUESTIONS-(SOLVED)
A.Multiple Choice Questions
  1. Which of the following is not a form of software priracy?
    a. Softlifiting
    b.Counterfeiting
    c.Hard Disc Loading
    d.Encrypting

  2. ............................... is the process of transforming data into an unreadable code.
    a.Copyright
    b.Trademark
    c.Encryption
    d.Information Security

  3. ............................... refers to flooding the user's innox with unwanted advertisements and messages.
    a.Spamming
    b.Virus
    c.Hacking
    d.Patent

  4. The right which is concerned with the design and algorithm of the product rather than the entire product is called ...............................
    a.Copyright
    b.Patent
    c.Trademark
    d.Data Protection Law

  5. E-commerce stands for...............................
    a.Electrical Commerce
    b.Etical Commerce
    c.Electronic Commerce
    d.None of these

  6. When someone elae we uses your online identity to create fraudulent messages or commit crimes, it is known as ...............................
    a.Identity theft
    b.Cyber theft
    c.E-commerce fraud
    d.Piracy

  7. ............................... is defined as the right to control what happens with your personal information.
    a.Pretexting
    b.Privacy
    c.Piracy
    d.Patent

  8. ............................... licences are a family of permissive free software licences.
    a.MIT
    b.Apache
    c.GNU
    d.BSD

  9. ............................... software is a copyrighted software.
    a.Private
    b.Proprietary.
    c.Privacy
    d.Protective

  10. ............................... Rights refer to intellectual property rights given to persons over the digital property created by them.
    a.Cyber
    b.Privacy
    c.Legal
    d.Digital Property

B.Fill in the Blanks:
  1. ............................................ is a system of moral principles that differentiates between good and bad practices.

  2. ............................................ to practice ethical code of conduct constitutes fraud.

  3. ............................................ is a technique used to reteive personal information of a user from his discarded documents.

  4. ............................................ is stealing confidential, personal and financial information from a computer or a mobile phones and misusing it to harm the users.

  5. ............................................ is obtaining personal information through direct observation by looking over a person's shoulder.

Learning Computers with Kips

216

Previous page Home Next page