A ______________ provide an exclusive right to prevent others from using, selling, or distributing the protected invention
1.copyright
2.trademark
3.patent
4.None of the above
Anyone who uses digital technology along with Internet is a __
1.Digital citizen
2.Netizen
3.Both of the above
4.None of the above
Code of the software will be protected by __
1.copyright
2.patent
3.registered trademark
4.None of the above
Digital footprints can be used to _
1.Trace the user’s location
2.Trace the user’s digital activity
3.know the digital personality of user.
4.All the above
e-waste is responsible for the degradation of our environment
1.True
2.False
3.Error
4.None of the above
Intellectual Property is legally protected through _
1. copyright
2.patent
3. registered trademark
4.All the above
Our digital footprint can be created by _
1.visiting any website
2.sending email
3. posting online
4.All the above
Our digital footprints are stored in local web browser in the form of __
1. browsing history
2.cookies
3.passwords
4.All the above
Ravi copy some contents from Internet, but do not mention the source or the original creator. This is an act of __
1.Plagiarism
2.Copyright Infringement
3.Trademark Infringement
4.Licence Infringement
The owner of a work can create _______ different types of CC licenses.
1.2
2.4
3.6
4.8
To use copyrighted material, one needs to obtain a license from owner.
1.True
2.False
3.Error
4.None of the above
We should be very careful while uploading anything online?
1.True
2.False
3.Error
4.None of the above
Which of the following constitute e-waste?
1.discarded computers
2.damaged printers
3. useless CDs
4.All the above
Which of the following is not a cyber crime?
1.Phishing
2.Ransomware
3.Hacking
4.Tracking
Which of the following is popular category of public licenses?
1.GPL
2.CC
3.Both of the above
4.All the above
A patent protects an invention for ___________ years, after which it can be freely used.
1.10
2.20
3.30
4.40
A responsible netizen must abide by _
1.net etiquettes
2.communication etiquettes
3. social media etiquettes
4.All the above
A ___________ is some lines of malicious code that can copy itself and can have detrimental effect on the computers, by destroying data or corrupting the system.
1.Cyber crime
2.Computer virus
3.Program
4.Software
A ____________ is a type of contract between the creator of an original work permitting someone to use their work, generally for some price.
1. Agreement
2.License
3.Patent
4.Copyright
After practical, Atharv left the computer laboratory but forgot to sign off from his email account. Later, his classmate Revaan started using the same computer. He is now logged in as Atharv. He sends inflammatory email messages to few of his classmates using Atharv’s email account. Revaan’s activity is an example of which of the following cyber crime?
1.Plagiarism
2.Hacking
3.Identity theft
4.Cyber bullying
Bad posture of using computer may cause ____
1.Backache
2.Neck Pain
3.Shoulder pain
4.All the above
Being a responsible digital citizen, we should _
1.not use copyrighted materials
2.avoid cyber bullying
3.respect privacy of others
4.All the above
CC (in reference to public license) stands for __
1.Creative Commons
2.Carbon copy
3.Creative Comments
4.Creative Culture
Communication etiquette include to _____
1.be polite with others
2.be credible
3.be precise
4.All the above
Data that can cause substantial harm, embarrassment, inconvenience and unfairness to an individual, if breached or compromised, is called __
1.Sensitive data
2.Important data
3.security data
4.None of the above
Digital communication includes _
1.Email
2.Texting
3.Instant messaging
4.All the above
Digital footprints are also known as _
1.Digital data
2.Plagiarism
3. Digital tattoos
4. Digital print
Digital footprints are stored _
1.Temporarily (for few days)
2.Permanently
3.for 7 days only
4.for 3 days
Digital signature is the scanned copy of physical signature.
1.True
2.False
3.Error
4.None of the above
e-waste is responsible for air, water and land pollution.
1.True
2.False
3.Error
4.None of the above
e-waste is very healthy for human being.
1.True
2.False
3.Error
4.None of the above
E-waste stands for ____
1.Electrical waste
2.Electronic waste
3.Electricity waste
4.E-waste
EULA stands for __
1.End User Leave Agreement
2.End User License Aim
3.End User License Agreement
4.None of the above
Every information available on internet is always correct
1.True
2.False
3.Error
4.None of the above
Example of sensitive data is ____
1.Name of a person
2.Credit card detail of a person
3.Date of birth of a person
4.None of the above
FOSS stands for ___
1.For open source software
2.Free and open set software
3.Free and open source software
4.None of the above
Functional expression of the idea/invention will be protected by _____
1.copyright
2.patent
3.registered trademark
4.None of the above
GPL is primarily designed for providing public license to a ______
1.software
2.websites
3.literature
4.music
GPL stands for ____
1.General Public License
2.GNU General Private License
3.GNU General Public License
4.GNU Public License
Hackers try to break security system ___
1.for Identity theft
2.for monetary gain
3. to leak sensitive information
4.All the above
Hacking, when done with a positive intent, is called ____
1.Ethical hacking
2.Active hacking
3.Passive hacking
4.Ethics
In India _______ law provides guidelines to the user on the processing, storage and transmission of sensitive information.
1.. Information Technology Act, 2000
2.Indian Technology Act, 2000
3. Inform Technology Act, 2000
4.. Information Technology Act, 2000
In social media platform, we can share _____
1.images
2.text
3.videos
4.All the above
In this era of digital society, we can do ____
1.Online Shopping
2.Online Banking
3.Online Education
4.All the above
IPR stands for ______
1. Indian Property Right
2. Intellectual Property Right
3.Intelligent Property Right
4.Intellectual Property Resource
Is having the same password for all your accounts on different websites is safe
1.True
2.False
3.Both of the above
4.None of the above
Licensing and copyrights are same terms.
1.True
2.False
3.Error
4.None of the above
Online posting of rumours, giving threats online, posting the victim’s personal information, comments aimed to publicly ridicule a victim is termed as __
1.Cyber bullying
2.Cyber crime
3.Cyber insult
4.All the above
Our digital foot prints are stored in ________
1.Local web browser
2.Servers where the applications are hosted
3.Both of the above
4.None of the above
Patentee has the full right of using, selling, or distributing the protected invention.
1.True
2.False
3.Error
4.None of the above
Presenting someone else’s idea or work as one’s own idea or work is called _
1.Plagiarism
2.Copyright infringement
3.Patent infringement
4.None of the above
Primary focus of ________ is on security cracking and data stealing.
1.ethical hacker
2. non ethical hacker
3.white hat hacker
4.None of the above
Proprietary software is a software which is available ____
1. free of charge
2.on paying license fee
3. free for first year only
4.None of the above
Ravi downloaded a software from internet (free of cost) and moreover the source code of the software is also available which can be modified. What category of software is this?
1.Shareware
2.Freeware
3.FOSS
4.Malware
Rishika found a crumpled paper under her desk. She picked it up and opened it. It contained some text which was struck off thrice. But she could still figure out easily that the struck off text was the email ID and password of Garvit , her classmate. What is ethically correct for Rishika to do?
1.Inform Garvit so that he may change his password
2.Give the password of Garvit’s email ID to all other classmates
3.Use Garvit’s password to access his account
4.None of the above
The digital data trail we leave online intentionally is called ___
1. Active digital footprints
2.Passive digital footprints
3.Current digital footprints
4.None of the above
The digital data trail we leave online unintentionally is called _____
1.ctive digital footprints
2.Passive digital footprints
3.Current digital footprints
4.None of the above
The name and logo of the software will be protected by _______
1. copyright
2.patent
3. registered trademark
4.None of the above
The process of re-selling old electronic goods at lower prices is called _
1.refurbishing
2.recycle
3.reuse
4.reduce
The ____________ include right to copy (reproduce) a work, right to distribute copies of the work to the public, and right to publicly display or perform the work.
1.Copyright
2.Patent
3.Createright
4.None of the above
There are _________ kinds of Digital footprints.
1.1
2.2
3.3
4.4
To be a responsible netizen, we should _
1.Choose password wisely
2.think before upload anything online.
3.change our password frequently.
4.All the above
What we have to ensures to maintain good health of a computer system?
1.Wipe monitor’s screen often using the regular microfiber soft cloth.
2.Keep it away from direct heat, sunlight and put it in a room with enough ventilation for air circulation.
3.Do not eat food or drink over the keyboard
4.All of the above
Whenever we surf the Internet using smartphones we leave a trail of data reflecting the activities performed by us online, which is our _____
1.Digital footprint
2.Digital activities
3.Online handprint
4.Internet activities
Which of the following activity is an example of leaving Active digital footprints?
1. Surfing internet
2.Visiting a website
3.Sending an email to friend
4.None of the above
Which of the following are feasible methods of e-waste management?
1. Reduce
2.Reuse
3.Recycle
4.All the above
Which of the following are Net Etiquette?
1. Be Ethical
2.Be Respectful
3.Be Responsible
4.All the above
Which of the following can be considered as safety measures to reduce the risk of cyber crime?
1.Which of the following can be considered as safety measures to reduce the risk of cyber crime?
2.Avoid installing pirated software.
3.Use strong password for web login, and change it periodically.
4.All the above
Which of the following is called black hat hacker?
1.Ethical hacker
2.Non Ethical hacker
3.Both of the above
4.None of the above
Which of the following is cyber crime?
1.Hacking
2.Phishing
3.Spamming
4.All the above
Which of the following is example of Social media?
1.Facebook
2.Twitter
3.Instagram
4.All the above
Which of the following is not an example of Social media platform?
1.Facebook
2.Pinterest
3.Google+
4.Social channel
Which of the following is type of Digital Footprints?
1.Active digital footprints
2. Passive digital footprints
3.Both of the above
4.None of the above
Which of the following is white hat hacker?
1.Ethical hacker
2. Non Ethical hacker
3.Both of the above
4.None of the above
_____ is a kind of cyber crime in which attacker blackmails the victim to pay for getting access to the data
1.Phishing
2.Identity theft
3.Ransomware
4.None of the above
_____ is defined as a crime in which computer is the medium of crime.
1. Computer crime
2.Cyber crime
3. Internet crime
4.Digital crime
______ are websites or applications that enable users to participate by creating and sharing content with others in the community.
1.Social media
2.Social channel
3.Social networking
4.None of the above
______ is a person who deliberately sows discord on the Internet by starting quarrels or upsetting people, by posting inflammatory or off topic messages in an online community.
1.Netizen
2.Digital Citizen
3. Internet troll
4.None of the above
______ package come under FOSS.
1.Libre Office
2.Open Office
3.Both of the above
4.None of the above
_______ browser come under FOSS.
1.Internet explorer
2.Chrome
3.Mozilla Firefox
4.None of the above
_______ operating system come under FOSS.
1.Ubuntu
2.Unix
3.Mac
4.Windows
_________ is a branch of science that deals with designing or arranging workplaces including the furniture, equipment and systems so that it becomes safe and comfortable for the user.
1.Ergonomics
2.Ergomics
3.Agonomics
4.All the above
_________ is the unauthorized use or distribution of software.
1.Software piracy
2.Piracy
3.Software copy
4.Pirated Software
_________ means using other’s work and not giving adequate citation for use.
1.Plagiarism
2.Licensing
3.Copyright
4.None of the above
__________ is the act of unauthorized access to a computer, computer network or any digital system.
1.Sign in
2.Hacking
3.Tracking
4.None of the above
____________ is an activity where fake websites or emails that look original or authentic are presented to the user.
1.Phishing
2.Hacking
3.Spamming
4. Identity theft
____________ means unauthorized use of other’s trademark on products and services.
1.Copyright Infringement
2.Trademark Infringement
3.Plagiarism
4.Patent
_____________ are the records and traces that we left behind as we use Internet.
1.Digital Footprints
2.Data Protection
3.Plagiarism
4.Digital Data
_____________ includes any visual symbol, word, name, design, slogan, label, etc., that distinguishes the brand from other brands
1.Trademark
2.Patent
3.Copyright
4.None of the above
_______________covers all clauses of software purchase, viz., how many copies can be installed, whether source is available, whether it can be modified and redistributed and so on.
1.EULA
2.EULE
3.AULA
4.AULI