Q.1 Sumona has invented a new theory in physics. She wants to protect it legally against unauthorized use. She should take its
a. Copyright
b. Patent
c. Trademark
d. None
Ans. a. Copyright
Q.2 Rajneesh’s continuous online classes and increasing use of computers made his mother worried about his health. Whic of the following point should not be suggested her mother to take care of?
a. Sit in right posture
b. Take breaks and do some physical activity
c. Keep the gadget above your height
d. Periodically rotate and watering eyes
Ans. c. Keep the gadget above your height
Q.3 Suresh has prepared a document on ‘Cyber Security’ and for this he
(i) Downloaded an image and pasted in document with some editing
(ii) Copied a phrase from website and rephrased it and used in document
Which of the above activity suresh did is an act of plagiarism?
a. Statement (i)
b. Statement (ii)
c. (i) and (ii)
d. None of the above
Ans.c. (i) and (ii)
Q.4 While surfing on Internet if your geo location is turned on, than it makes
a. Active digital footprint
b. Passive digital footprint
c. Active e footprint
d. Passive e footprint
Ans. b. Passive digital footprint
Q.5 Read following statements:
(i) Trademark is a document that provides legally binding guidelines for the use and distribution of software.
(ii) Hacking is the act of unauthorized access to a computer, computer network or any digital system.
Which of the following is correct?
a. (i) True, (ii) False
b. (i) False, (ii) True
c. Both are True
d. Both are False
Ans. b. (i) False, (ii) True
Q.6 How does excessive use of technology can affect physical health?
a. Internet Addiction
b. Social Isolation
c. Anxiety & Depression
d. a and c
Ans. d. a and c
Q.7 Intellectual property refers to
a. Inventions
b. Artistic expressions
c. Real estate
d. a & b
e. all
Ans. d. a & b
Q.8 Which of the following law is granted automatically to the creator/owner
a. Copyright
b. Patent
c. Trademark
d. License
Ans. a. Copyright
Q.9 Which of the following browser is an open source software?
a. Chrome
b. Firefox
c. Edge
d. All of the above
Ans. b. Firefox
Q.10 Read following statements:
(i) Digital footprint is nothing but the record of what a person do online.
(ii) Patents are automatically granted to creators and authors.
Which of the following is correct?
a. (i) True, (ii) False
b. (i) False, (ii) True
c. Both are True
d. Both are False
Ans. a. (i) True, (ii) False
Q.11 Hacking, when done with positive intent is called ____
a. White Hacking
b. Cracking
c. Ethical Hacking
d. Good hacking
Ans. c. Ethical Hacking
Q.12 A patent protects an invention for _____ years, after which it be freely used.
a. 10
b. 20
c. 30
d. Lifetime
Ans. b. 20
Q.13 Digital Footprint is also termed as
a. Digital tattoo
b. E-Footprint
c. Digital Trail
d. Digital Mark
Ans. a. Digital tattoo
Q.14 Which of the following does not match with the objective of Free Software?
a. It gives user freedom to use program for any purpose
b. It gives user freedom to study functionality of program
c. It gives user freedom to redistribute copies to others and get benefited with incentives.
d. It gives user freedom to update the program and release updated version publically for community benefits
Ans. c. It gives user freedom to redistribute copies to others and get benefited with incentives.
Q.15 Which of the following does not comes under the Creative Common License?
a. Movie
b. Image
c. Book
d. Software
Ans. d. Software
Q.16 Select the incorrect statement-
a. IPR gives owner right to decide how much information he/she can share with user.
b. IPR encourages creators to invent new ideas, designs, and softwares.
c. IPR ensures that some of the properties cannot be disclosed publically.
d. IPR gives owner right to get financial benefits against their creation/inventions.
Ans. c. IPR ensures that some of the properties cannot be disclosed publically.
Q.17 The software which can be used and copied freely but cannot be modified
a. Freeware
b. Shareware
c. Proprietary software
d. Open source software
Ans. a. Freeware
Q.18 Which of the following is advantage of proprietary software?
a. It is bug free
b. It is customizable
c. It is not free
d. Too generic for specific purpose
Ans. a. It is bug free
Q.19 Hackers who practices hacking with positive intent are known as
a. Black hat hackers
b. White hat hackers
c. Red hat hackers
d. Gray hat hackers
Ans. b. White hat hackers
Q.20 To grant user the rights to copy, modify, redistribute a Software______ public license is used-
a. CC
b. GNU GPL
c. a and b both
d. none
Ans. b. GNU GPL
Q.21 When a user share his image in Facebook deliberately, he leaves trail of data called as
a. Active Digital Footprint
b. Passive Digital Footprint
c. E- Footprint
d. Digital Marks
Ans a. Active Digital Footprint
Q.22 Read following statements:
(i) Always check the content you post on the web.
(ii) Copyright is usually granted for inventions.
Which of the following is correct?
a. (i) True, (ii) False
b. (i) False, (ii) True
c. Both are True
d. Both are False
Ans. c. Both are True
Q.23 The practice of taking someone’s work or ideas and passing them off as one’s own is known as ___
a. Identity Theft
b. Spamming
c. hacking
d. Plagiarism
Ans. d. Plagiarism
Q.24 To prevent unauthorized access to and or from the network, a system known as
a. Gateway
b. Antivirus
c. Firewall
d. Net Protector
Ans. c. Firewall
Q.25 Read following statements:
(i) End user license Agreement (EULA) indicates the term under which the end user may use the software
(ii) Netiquettes help in making good digital footprint of yours.
Which of the following is correct?
a. (i) True, (ii) False
b. (i) False, (ii) True
c. Both are True
d. Both are False
Ans. c. Both are True
Q.26 Traditional symbols, signs can be protected as
a. Copyright
b. Patent
c. Trademark
d. IPR
Ans. c. Trademark
Q.27 Symbols, words, short phrases, slogans, signs can be protected under
a. Copyright
b. Patent
c. Trademark
d. Licence
Ans. a. Copyright
Q.28 “Copyright protects only form of expression of an Idea and not Idea itself.”
a. True
b. False
Ans. a. True
Q.29 EULA stands for
a. Earn Under License Agreement
b. End User License Agreement
c. End User Lost Agreement
d. None
Ans. b. End User License Agreement
Q.30 Which is incorrect
a. EULA contains dos and don’ts with respect to the software being purchased.
b. Copyright protects the Idea itself not its form of expression.
c. Copyright infringement means using creator’s work without his permission or without paying for it.
d. Using other’s work without giving him/her citation is called Plagiarism.
Ans. b. Copyright protects the Idea itself not its form of expression.
Q.31 Which of the following is not comes under violation of IPR?
a. Copyright Infringement
b. Plagiarism
c. Illegal Download
d. Phishing
Ans.d. Phishing
Q.32 Copying someone else work and passing it further as own work is called
a. Plagiarism
b. Phishing
c. Stacking
d. Bullying
Ans. a. Plagiarism
Q.33 The software which can be used, copied, distributed and modified freely is
a. Free software
b. Open source software
c. Shareware
d. Proprietary software
Ans. b. Open source software
Q.34 Which of the following is disadvantage of open source software?
a. Low quality software
b. It is customizable
c. Might have bugs as not tested critically
d. It is free
Ans. c. Might have bugs as not tested critically
Q.35 Adobe pdf reader is an example of
a. Free software
b. Open source software
c. Shareware
d. Proprietary software
Ans. a. Free software
Q.36 Which of the following operating system is not an open source software
a. Linux
b. Ubuntu
c. Win-8
d. Macintosh
e. Both c and d
f. Both a and b
Ans. e. Both c and d
Q.37 Which of the following is an open source software?
a. MS Office
b. MySQL
c. Photoshop
d. Skype
Ans. b. MySQL
Q.38 Which of the following is not a cyber crime?
a. Illegal download
b. Identity theft
c. Spamming
d. Stealing laptop battery
Ans. d. Stealing laptop battery
Q.39 Software which generally limits the functionality after trial period is
a. Freeware
b. Proprietary software
c. Shareware
d. Open source software
Ans. c. Shareware
Q.40 The primary focus of hackers (with negative intent) is/are
a. Security cracking
b. Data stealing
c. Bullying
d. a & b both
Ans. d. a & b both
Q.41 Illegal act to gain unauthorized access to any computer, network or digital system is
a. Copyright infringement
b. DoS Attack
c. Hacking
d. Plagiarism
Ans. c. Hacking
Q.42 The most common method in phishing is
a. Sending fake emails
b. Sending Cookies
c. Making fake calls
d. Sending fake messages
Ans. a. Sending fake emails
Q.43 Stealing someone’s personal information and misusing on behalf of him/her is
a. Spoofing
b. Cyber Bullying
c. Identity theft
d. Phishing
Ans. c. Identity theft
Q.44 The name of IT Law in India is
a. India’s Technology Act
b. Information Technology Act
c. Cyber Safety Act
d. None of the above
Ans. b. Information Technology Act
Q.45 Your personal website is an example of
a. Intellectual Property
b. Digital Property
Ans. a. Intellectual Property
Q.46 At lunch break Sharman forgot to log off from his email account. Later Sidhesh come and get into Shrman account. He start sending provoking messages to others. Which illegal activity Sidhesh is doing
a. Hacking
b. Cyber Bullying
c. Plagiarism
d. Identity Theft
Ans. d. Identity Theft
Q.47 Chatram found an photo of Lalu. He edited it to embarrassed photo and shared in social website just to threaten Lalu. What kind of cyber crime Chatram is doing here
a. Phishing
b. Cyber Bullying
c. Plagiarism
d. Identity Theft
Ans. b. Cyber Bullying
Q.48 Ridhima got a SMS from her bank to update her debit card. And to do so she shared her pin with sender and got cheated. What kind of crime happened with her?
a. Bullying
b. Spoofing
c. Phishing
d. Stacking
Ans.b. Spoofing
Q.49 The software made by techtipnow is type of
a. Open source software
b. Freeware
c. Shareware
d. Proprietary software
Ans. d. Proprietary software
Q.50 Cyber Crime means
a. Stealing someone’s computer and printing duplicate currency
b. Stealing someone personal information and gaining medical insurance behalf of him/her
c. Making fake calls
d. Any crime involves computer, Internet or digital technology
Ans. d. Any crime involves computer, Internet or digital technology