Friday 8 January 2016

Cyber laws (Questions & Answers) -2

16. Which of the following is an Intellectual Property crime?
(a) Theft of computer source code      
(b) Trademarks violations
(c) Software piracy
(d)  All of these
Answer: (d)

17. Altering raw data just before it is processed by a computer and then changing it back after the processing is completed, is termed:
(a) Salami Attack (b) Data diddling
(c) Computer voyeur (d) none of these
Answer: (b)


18. Use of computer resources to intimidate or coerce others, is termed:
(a) Cybernetics (b) Cyber terrorism
(c) Web hosting (d) none of these
Answer: (b)

19. The criminal reads or copies confidential or proprietary information,but the data is neither deleted nor changed- This is termed:
(a) Computer voyeur (b) Spamming
(c) Data diddling         (d) None of these
Answer: (a)

20. India’s first cyber police station was started at:
(a) Chennai (b) Bangalore
(c) New Delhi (d) Mumbai
Answer: (b)

21. Posting derogatory remarks about the employer on a social networking site is an example of:
(a) Hacking (b) Spamming
(c) Cyber defamation (d) Spoofing
Answer: (c)

22. The president of India who gave assent to Information Technology Act 2000:
(a) APJ Abdul Kalam  (b) K.R.Narayanan
(c) Pratibha Patil        (d) None of these
Answer: (b)


23. The IT (Amendment) Bill 2008 was passed by the two houses of the Indian Parliament on_____ 2008.
(a) December 23 and 24 (b)  February 7 and 8
(c) October 26 and 27 (d) Decemeber 30 and 31
Answer: (a)

24.Cyber crime can be defined as:
(a) A crime committed online
(b) Stealing of a computer
(c) Organising theft in a computer shop
(d) None of these
Answer: (a)

25. Cyber Laws are included in:
(a) Union List (b) State List
(c) Residuary Powers (d) Concurrent List
Answer: (c)

26. The seat of the Asian School of Cyber Laws:
(a)New Delhi (b) Pune
(c) Chennai (d)   Mumbai
Answer: (b)

27. The explicit portrayal of sexual subject matter is termed:
(a) Pornography (b) Spamming 
(c) Junking (d) None of these
Answer: (a)

28. _____refers to email that appears to have been originated from one source when it was actually sent from another source.
(a) Email bombing (b) Email spoofing
(c) Email spamming (d)  None of these
Answer: (b)

29. A type of cyber crime that occurs in pay per click online advertising when a person, automated script or computer program imitates a legitimate user of a web browser clicking on an ad, for the purpose of generating a charge per click without having actual interest in the target of the ad’s link.
(a) Phishing (b) Zombie
(c) Click fraud (d) None of these
Answer: (c)

30. Which of the following is a cyber crime?
( a) Hacking (b) Worm attack
(c) Virus attack (d) All of these
Answer: (d)
Next Page01, 02, 03,>
Information Technology - Questions - Click here
PSC TODAYS EXAM RESULTS ---> Click here
PSC EXAM PROGRAMME -> Click here
PSC RANK LISTS / SHORT LISTS -> Click here
PSC FREE MOCK TEST -> Click here
Related Links
01. CURRENT AFFAIRS ---> Click here
02. GENERAL KNOWLEDGE QUESTIONS (English) ---> Click here
03. LDC/LGS/VEO/LAB ASSISTANT QUESTIONS ---> Click here
04. 1000 Previous Questions and Answers  ---> Click here
05. GENERAL SCIENCE - QUESTIONS AND ANSWERS
* SCERT KERALA TEXT BOOKS FOR CLASS II, IV, VI, VIII, IX, X, XII – FREE DOWNLOAD ---> Click here
* NCERT & CBSE TEXT BOOKS FOR ALL CLASSES – FREE DOWNLOAD ---> Click here
* NCERT & CBSE TEXT BOOKS SOLUTIONS FOR ALL CLASSES ---> Click here

No comments:

Post a Comment