Cyber Safety MCQ Questions and Answers in Hindi

Q.1 Sumona has invented a new theory in physics. She wants to protect it legally against unauthorized use. She should take its

a. Copyright
b. Patent
c. Trademark
d. None

Ans. a. Copyright

Q.2 Rajneesh’s continuous online classes and increasing use of computers made his mother worried about his health. Whic of the following point should not be suggested her mother to take care of?

a. Sit in right posture
b. Take breaks and do some physical activity
c. Keep the gadget above your height
d. Periodically rotate and watering eyes

Ans. c. Keep the gadget above your height

Q.3 Suresh has prepared a document on ‘Cyber Security’ and for this he

(i) Downloaded an image and pasted in document with some editing
(ii) Copied a phrase from website and rephrased it and used in document
Which of the above activity suresh did is an act of plagiarism?

a. Statement (i)
b. Statement (ii)
c. (i) and (ii)
d. None of the above

Ans.c. (i) and (ii)

Q.4 While surfing on Internet if your geo location is turned on, than it makes

a. Active digital footprint
b. Passive digital footprint
c. Active e footprint
d. Passive e footprint

Ans. b. Passive digital footprint

Q.5 Read following statements:
(i) Trademark is a document that provides legally binding guidelines for the use and distribution of software.
(ii) Hacking is the act of unauthorized access to a computer, computer network or any digital system.
Which of the following is correct?

a. (i) True, (ii) False
b. (i) False, (ii) True
c. Both are True
d. Both are False

Ans. b. (i) False, (ii) True

Q.6 How does excessive use of technology can affect physical health?

a. Internet Addiction
b. Social Isolation
c. Anxiety & Depression
d. a and c

Ans. d. a and c

Q.7 Intellectual property refers to

a. Inventions
b. Artistic expressions
c. Real estate
d. a & b
e. all

Ans. d. a & b

Q.8 Which of the following law is granted automatically to the creator/owner

a. Copyright
b. Patent
c. Trademark
d. License

Ans. a. Copyright

Q.9 Which of the following browser is an open source software?

a. Chrome
b. Firefox
c. Edge
d. All of the above

Ans. b. Firefox

Q.10 Read following statements:
(i) Digital footprint is nothing but the record of what a person do online.
(ii) Patents are automatically granted to creators and authors.
Which of the following is correct?

a. (i) True, (ii) False
b. (i) False, (ii) True
c. Both are True
d. Both are False

Ans. a. (i) True, (ii) False

Q.11 Hacking, when done with positive intent is called ____

a. White Hacking
b. Cracking
c. Ethical Hacking
d. Good hacking

Ans. c. Ethical Hacking

Q.12 A patent protects an invention for _____ years, after which it be freely used.

a. 10
b. 20
c. 30
d. Lifetime

Ans. b. 20

Q.13 Digital Footprint is also termed as

a. Digital tattoo
b. E-Footprint
c. Digital Trail
d. Digital Mark

Ans. a. Digital tattoo

Q.14 Which of the following does not match with the objective of Free Software?

a. It gives user freedom to use program for any purpose
b. It gives user freedom to study functionality of program
c. It gives user freedom to redistribute copies to others and get benefited with incentives.
d. It gives user freedom to update the program and release updated version publically for community benefits

Ans. c. It gives user freedom to redistribute copies to others and get benefited with incentives.

Q.15 Which of the following does not comes under the Creative Common License?

a. Movie
b. Image
c. Book
d. Software

Ans. d. Software

Q.16 Select the incorrect statement-
a. IPR gives owner right to decide how much information he/she can share with user.
b. IPR encourages creators to invent new ideas, designs, and softwares.
c. IPR ensures that some of the properties cannot be disclosed publically.
d. IPR gives owner right to get financial benefits against their creation/inventions.

Ans. c. IPR ensures that some of the properties cannot be disclosed publically.

Q.17 The software which can be used and copied freely but cannot be modified

a. Freeware
b. Shareware
c. Proprietary software
d. Open source software

Ans. a. Freeware

Q.18 Which of the following is advantage of proprietary software?

a. It is bug free
b. It is customizable
c. It is not free
d. Too generic for specific purpose

Ans. a. It is bug free

Q.19 Hackers who practices hacking with positive intent are known as

a. Black hat hackers
b. White hat hackers
c. Red hat hackers
d. Gray hat hackers

Ans. b. White hat hackers

Q.20 To grant user the rights to copy, modify, redistribute a Software______ public license is used-

a. CC
b. GNU GPL
c. a and b both
d. none

Ans. b. GNU GPL

Q.21 When a user share his image in Facebook deliberately, he leaves trail of data called as

a. Active Digital Footprint
b. Passive Digital Footprint
c. E- Footprint
d. Digital Marks

Ans a. Active Digital Footprint

Q.22 Read following statements:
(i) Always check the content you post on the web.
(ii) Copyright is usually granted for inventions.
Which of the following is correct?
a. (i) True, (ii) False
b. (i) False, (ii) True
c. Both are True
d. Both are False

Ans. c. Both are True

Q.23 The practice of taking someone’s work or ideas and passing them off as one’s own is known as ___

a. Identity Theft
b. Spamming
c. hacking
d. Plagiarism

Ans. d. Plagiarism

Q.24 To prevent unauthorized access to and or from the network, a system known as

a. Gateway
b. Antivirus
c. Firewall
d. Net Protector

Ans. c. Firewall

Q.25 Read following statements:
(i) End user license Agreement (EULA) indicates the term under which the end user may use the software
(ii) Netiquettes help in making good digital footprint of yours.

Which of the following is correct?
a. (i) True, (ii) False
b. (i) False, (ii) True
c. Both are True
d. Both are False

Ans. c. Both are True

Q.26 Traditional symbols, signs can be protected as

a. Copyright
b. Patent
c. Trademark
d. IPR

Ans. c. Trademark

Q.27 Symbols, words, short phrases, slogans, signs can be protected under

a. Copyright
b. Patent
c. Trademark
d. Licence

Ans. a. Copyright

Q.28 “Copyright protects only form of expression of an Idea and not Idea itself.”
a. True
b. False

Ans. a. True

Q.29 EULA stands for

a. Earn Under License Agreement
b. End User License Agreement
c. End User Lost Agreement
d. None

Ans. b. End User License Agreement

Q.30 Which is incorrect
a. EULA contains dos and don’ts with respect to the software being purchased.
b. Copyright protects the Idea itself not its form of expression.
c. Copyright infringement means using creator’s work without his permission or without paying for it.
d. Using other’s work without giving him/her citation is called Plagiarism.

Ans. b. Copyright protects the Idea itself not its form of expression.

Q.31 Which of the following is not comes under violation of IPR?

a. Copyright Infringement
b. Plagiarism
c. Illegal Download
d. Phishing

Ans.d. Phishing

Q.32 Copying someone else work and passing it further as own work is called

a. Plagiarism
b. Phishing
c. Stacking
d. Bullying

Ans. a. Plagiarism

Q.33 The software which can be used, copied, distributed and modified freely is

a. Free software
b. Open source software
c. Shareware
d. Proprietary software

Ans. b. Open source software

Q.34 Which of the following is disadvantage of open source software?

a. Low quality software
b. It is customizable
c. Might have bugs as not tested critically
d. It is free

Ans. c. Might have bugs as not tested critically

Q.35 Adobe pdf reader is an example of

a. Free software
b. Open source software
c. Shareware
d. Proprietary software

Ans. a. Free software

Q.36 Which of the following operating system is not an open source software

a. Linux
b. Ubuntu
c. Win-8
d. Macintosh
e. Both c and d
f. Both a and b

Ans. e. Both c and d

Q.37 Which of the following is an open source software?

a. MS Office
b. MySQL
c. Photoshop
d. Skype

Ans. b. MySQL

Q.38 Which of the following is not a cyber crime?

a. Illegal download
b. Identity theft
c. Spamming
d. Stealing laptop battery

Ans. d. Stealing laptop battery

Q.39 Software which generally limits the functionality after trial period is

a. Freeware
b. Proprietary software
c. Shareware
d. Open source software

Ans. c. Shareware

Q.40 The primary focus of hackers (with negative intent) is/are

a. Security cracking
b. Data stealing
c. Bullying
d. a & b both

Ans. d. a & b both

Q.41 Illegal act to gain unauthorized access to any computer, network or digital system is

a. Copyright infringement
b. DoS Attack
c. Hacking
d. Plagiarism

Ans. c. Hacking

Q.42 The most common method in phishing is

a. Sending fake emails
b. Sending Cookies
c. Making fake calls
d. Sending fake messages

Ans. a. Sending fake emails

Q.43 Stealing someone’s personal information and misusing on behalf of him/her is

a. Spoofing
b. Cyber Bullying
c. Identity theft
d. Phishing

Ans. c. Identity theft

Q.44 The name of IT Law in India is

a. India’s Technology Act
b. Information Technology Act
c. Cyber Safety Act
d. None of the above

Ans. b. Information Technology Act

Q.45 Your personal website is an example of

a. Intellectual Property
b. Digital Property

Ans. a. Intellectual Property

Q.46 At lunch break Sharman forgot to log off from his email account. Later Sidhesh come and get into Shrman account. He start sending provoking messages to others. Which illegal activity Sidhesh is doing

a. Hacking
b. Cyber Bullying
c. Plagiarism
d. Identity Theft

Ans. d. Identity Theft

Q.47 Chatram found an photo of Lalu. He edited it to embarrassed photo and shared in social website just to threaten Lalu. What kind of cyber crime Chatram is doing here
a. Phishing
b. Cyber Bullying
c. Plagiarism
d. Identity Theft
Ans. b. Cyber Bullying

Q.48 Ridhima got a SMS from her bank to update her debit card. And to do so she shared her pin with sender and got cheated. What kind of crime happened with her?

a. Bullying
b. Spoofing
c. Phishing
d. Stacking

Ans.b. Spoofing

Q.49 The software made by techtipnow is type of

a. Open source software
b. Freeware
c. Shareware
d. Proprietary software

Ans. d. Proprietary software

Q.50 Cyber Crime means

a. Stealing someone’s computer and printing duplicate currency
b. Stealing someone personal information and gaining medical insurance behalf of him/her
c. Making fake calls
d. Any crime involves computer, Internet or digital technology

Ans. d. Any crime involves computer, Internet or digital technology

Leave a Reply

Your email address will not be published.