SECTION 1:OBJECTIVE TYPE QUESTIONS-(SOLVED)
A.Multiple Choice Questions
- Which of the following is not a form of software priracy?
a. Softlifiting b.Counterfeiting c.Hard Disc Loading d.Encrypting
- ............................... is the process of transforming data into an unreadable code.
a.Copyright b.Trademark c.Encryption d.Information Security
- ............................... refers to flooding the user's innox with unwanted advertisements and messages.
a.Spamming b.Virus c.Hacking d.Patent
- The right which is concerned with the design and algorithm of the product rather than the entire product is called ...............................
a.Copyright b.Patent c.Trademark d.Data Protection Law
- E-commerce stands for...............................
a.Electrical Commerce b.Etical Commerce c.Electronic Commerce d.None of these
- When someone elae we uses your online identity to create fraudulent messages or commit crimes, it is known as ...............................
a.Identity theft b.Cyber theft c.E-commerce fraud d.Piracy
- ............................... is defined as the right to control what happens with your personal information.
a.Pretexting b.Privacy c.Piracy d.Patent
- ............................... licences are a family of permissive free software licences.
a.MIT b.Apache c.GNU d.BSD
- ............................... software is a copyrighted software.
a.Private b.Proprietary. c.Privacy d.Protective
- ............................... Rights refer to intellectual property rights given to persons over the digital property created by them.
a.Cyber b.Privacy c.Legal d.Digital Property
B.Fill in the Blanks:
- ............................................ is a system of moral principles that differentiates between good and bad practices.
- ............................................ to practice ethical code of conduct constitutes fraud.
- ............................................ is a technique used to reteive personal information of a user from his discarded documents.
- ............................................ is stealing confidential, personal and financial information from a computer or a mobile phones and misusing it to harm the users.
- ............................................ is obtaining personal information through direct observation by looking over a person's shoulder.
|