Elementary Computer Applications-
MCQs- Paper- 09- Topics:- Computer Ethics, Cyber Law & IT Act.
Computer Ethics
1. Computer ethics mainly deals
with —
A. Hardware design
B. Moral use of computers
C. Software coding
D. Networking
✅ Answer:
B
2. Unauthorized access to a system
is considered —
A. Innovation
B. Ethical hacking
C. Unethical behavior
D. Optimization
✅ Answer:
C
3. Copying software without license
violates —
A. Privacy
B. Computer ethics
C. Formatting rules
D. Email policy
✅ Answer:
B
4. Plagiarism in computing means —
A. Sharing files
B. Stealing ideas/code without credit
C. Debugging
D. Compiling
✅ Answer:
B
5. Ethical computer use promotes —
A. Data theft
B. Respect for privacy
C. Password sharing
D. Piracy
✅ Answer:
B
Cyber Law
6. Cyber law is related to —
A. Physical crimes only
B. Internet and digital crimes
C. Traffic rules
D. Banking only
✅ Answer:
B
7. Which is a cyber crime?
A. Phishing
B. Farming
C. Printing
D. Formatting
✅ Answer:
A
8. Cyber law protects —
A. Digital data
B. Forests
C. Vehicles
D. Buildings
✅ Answer:
A
9. Hacking comes under —
A. Civil law
B. Cyber law
C. Tax law
D. Property law
✅ Answer:
B
10. Sending threatening emails is —
A. Legal
B. Cyber offense
C. Ethical
D. Acceptable
✅ Answer:
B
IT Act 2000 – Basics
11. IT Act in India was passed in —
A. 1995
B. 1998
C. 2000
D. 2005
✅ Answer:
C
12. IT Act 2000 deals with —
A. Digital transactions
B. Agriculture
C. Transport
D. Education policy
✅ Answer:
A
13. IT Act gives legal recognition
to —
A. Printed documents
B. Digital signatures
C. Handwritten notes
D. Photographs
✅ Answer:
B
14. Controller of Certifying
Authorities (CCA) is related to —
A. Passport
B. Digital certificates
C. Driving license
D. Voter ID
✅ Answer:
B
15. IT Act applies to —
A. Only government offices
B. Only banks
C. Whole India digital space
D. Only software companies
✅ Answer:
C
16. Section 43 of IT Act deals with
—
A. Damage to computer systems
B. Marriage law
C. Property sale
D. Banking tax
✅ Answer:
A
17. Digital signature ensures —
A. Speed
B. Authenticity
C. Color printing
D. Storage
✅ Answer:
B
Software Piracy
18. Software piracy means —
A. Software testing
B. Illegal copying of software
C. Software updating
D. Software design
✅ Answer:
B
19. Using cracked software is —
A. Legal
B. Ethical
C. Illegal
D. Required
✅ Answer:
C
20. Example of piracy —
A. Licensed Windows
B. Trial software
C. Torrent download of paid software
D. Open-source software
✅ Answer:
C
21. Piracy harms —
A. Only users
B. Only government
C. Developers & companies
D. Internet speed
✅ Answer:
C
22. Copyright protects —
A. Software code
B. Monitor
C. Mouse
D. Printer
✅ Answer:
A
23. BSA stands for —
A. Business Software Alliance
B. Binary System Access
C. Basic Software Act
D. Browser Safety Authority
✅ Answer:
A
Intellectual Property (IPR)
24. IPR stands for —
A. Internet Privacy Rules
B. Intellectual Property Rights
C. Internal Program Rules
D. Input Processing Rights
✅ Answer:
B
25. Patent protects —
A. Inventions
B. Songs
C. Logos
D. Books
✅ Answer:
A
26. Trademark protects —
A. Brand name/logo
B. Code
C. Hardware
D. Network
✅ Answer:
A
27. Copyright protects —
A. Literary & software work
B. Buildings
C. Land
D. Machines
✅ Answer:
A
28. Example of intellectual
property —
A. Source code
B. Keyboard
C. CPU
D. Cable
✅ Answer:
A
29. IPR violation leads to —
A. Rewards
B. Legal penalty
C. Faster internet
D. Free license
✅ Answer:
B
Child Abuse (Online)
30. Online child abuse includes —
A. Online grooming
B. File download
C. Coding
D. Gaming
✅ Answer:
A
31. Grooming means —
A. Hair cutting
B. Building trust to exploit minors
C. Cleaning data
D. Formatting drive
✅ Answer:
B
32. Sharing child abuse content is
—
A. Legal
B. Serious crime
C. Acceptable
D. Ethical
✅ Answer:
B
33. Law protecting children online
in India includes —
A. IT Act + POCSO
B. Motor Act
C. RTI
D. GST
✅ Answer:
A
34. Reporting child abuse should be
done to —
A. Cyber cell
B. Movie hall
C. Bank
D. Library
✅ Answer:
A
Social Engineering
35. Social engineering attacks
target —
A. Hardware
B. Human psychology
C. RAM
D. CPU
✅ Answer:
B
36. Phishing is —
A. Fishing game
B. Fake email to steal data
C. Coding method
D. Antivirus
✅ Answer:
B
37. Pretexting means —
A. Creating fake story to get info
B. Writing code
C. Text formatting
D. Encryption
✅ Answer:
A
38. Baiting attack uses —
A. Free offers to trap users
B. Firewalls
C. Passwords
D. Backup
✅ Answer:
A
39. Tailgating means —
A. Following someone physically to gain access
B. Driving fast
C. Data backup
D. System reboot
✅ Answer:
A
40. OTP sharing leads to —
A. Security
B. Account compromise
C. Faster login
D. Encryption
✅ Answer:
B
Mixed Cyber Ethics & Law
41. Strong password is part of —
A. Computer ethics
B. Hardware design
C. Graphics
D. Printing
✅ Answer:
A
42. Identity theft is —
A. Legal
B. Cyber crime
C. Optimization
D. Backup
✅ Answer:
B
43. Using others’ Wi-Fi without
permission is —
A. Ethical
B. Unethical
C. Required
D. Standard
✅ Answer:
B
44. Cyber stalking is —
A. Gardening
B. Online harassment
C. Coding
D. Testing
✅ Answer:
B
45. Fake websites are used for —
A. Phishing
B. Gaming
C. Teaching
D. Streaming
✅ Answer:
A
46. Encryption helps in —
A. Data security
B. Data theft
C. Piracy
D. Plagiarism
✅ Answer:
A
47. Firewall is used for —
A. Cooking
B. Network protection
C. Printing
D. Coding
✅ Answer:
B
48. Ethical hackers are also called
—
A. Black hats
B. White hats
C. Pirates
D. Crackers
✅ Answer:
B
49. Sharing licensed software
publicly is —
A. Legal
B. Software piracy
C. Backup
D. Debugging
✅ Answer:
B
50. Best defense against social
engineering —
A. Awareness & verification
B. Fast typing
C. More RAM
D. Color monitor
✅ Answer:
A
===========================================================
0 Comments