Elementary Computer Applications- MCQs- Paper- 09- Topics:- Computer Ethics, Cyber Law & IT Act .

 Elementary Computer Applications- MCQs- Paper- 09- 
Topics:- Computer Ethics, Cyber Law & IT Act.
 

Computer Ethics

1. Computer ethics mainly deals with —
A. Hardware design
B. Moral use of computers
C. Software coding
D. Networking
Answer: B

2. Unauthorized access to a system is considered —
A. Innovation
B. Ethical hacking
C. Unethical behavior
D. Optimization
Answer: C

3. Copying software without license violates —
A. Privacy
B. Computer ethics
C. Formatting rules
D. Email policy
Answer: B

4. Plagiarism in computing means —
A. Sharing files
B. Stealing ideas/code without credit
C. Debugging
D. Compiling
Answer: B

5. Ethical computer use promotes —
A. Data theft
B. Respect for privacy
C. Password sharing
D. Piracy
Answer: B


Cyber Law

6. Cyber law is related to —
A. Physical crimes only
B. Internet and digital crimes
C. Traffic rules
D. Banking only
Answer: B

7. Which is a cyber crime?
A. Phishing
B. Farming
C. Printing
D. Formatting
Answer: A

8. Cyber law protects —
A. Digital data
B. Forests
C. Vehicles
D. Buildings
Answer: A

9. Hacking comes under —
A. Civil law
B. Cyber law
C. Tax law
D. Property law
Answer: B

10. Sending threatening emails is —
A. Legal
B. Cyber offense
C. Ethical
D. Acceptable
Answer: B


IT Act 2000 – Basics

11. IT Act in India was passed in —
A. 1995
B. 1998
C. 2000
D. 2005
Answer: C

12. IT Act 2000 deals with —
A. Digital transactions
B. Agriculture
C. Transport
D. Education policy
Answer: A

13. IT Act gives legal recognition to —
A. Printed documents
B. Digital signatures
C. Handwritten notes
D. Photographs
Answer: B

14. Controller of Certifying Authorities (CCA) is related to —
A. Passport
B. Digital certificates
C. Driving license
D. Voter ID
Answer: B

15. IT Act applies to —
A. Only government offices
B. Only banks
C. Whole India digital space
D. Only software companies
Answer: C

16. Section 43 of IT Act deals with —
A. Damage to computer systems
B. Marriage law
C. Property sale
D. Banking tax
Answer: A

17. Digital signature ensures —
A. Speed
B. Authenticity
C. Color printing
D. Storage
Answer: B


Software Piracy

18. Software piracy means —
A. Software testing
B. Illegal copying of software
C. Software updating
D. Software design
Answer: B

19. Using cracked software is —
A. Legal
B. Ethical
C. Illegal
D. Required
Answer: C

20. Example of piracy —
A. Licensed Windows
B. Trial software
C. Torrent download of paid software
D. Open-source software
Answer: C

21. Piracy harms —
A. Only users
B. Only government
C. Developers & companies
D. Internet speed
Answer: C

22. Copyright protects —
A. Software code
B. Monitor
C. Mouse
D. Printer
Answer: A

23. BSA stands for —
A. Business Software Alliance
B. Binary System Access
C. Basic Software Act
D. Browser Safety Authority
Answer: A


Intellectual Property (IPR)

24. IPR stands for —
A. Internet Privacy Rules
B. Intellectual Property Rights
C. Internal Program Rules
D. Input Processing Rights
Answer: B

25. Patent protects —
A. Inventions
B. Songs
C. Logos
D. Books
Answer: A

26. Trademark protects —
A. Brand name/logo
B. Code
C. Hardware
D. Network
Answer: A

27. Copyright protects —
A. Literary & software work
B. Buildings
C. Land
D. Machines
Answer: A

28. Example of intellectual property —
A. Source code
B. Keyboard
C. CPU
D. Cable
Answer: A

29. IPR violation leads to —
A. Rewards
B. Legal penalty
C. Faster internet
D. Free license
Answer: B


Child Abuse (Online)

30. Online child abuse includes —
A. Online grooming
B. File download
C. Coding
D. Gaming
Answer: A

31. Grooming means —
A. Hair cutting
B. Building trust to exploit minors
C. Cleaning data
D. Formatting drive
Answer: B

32. Sharing child abuse content is —
A. Legal
B. Serious crime
C. Acceptable
D. Ethical
Answer: B

33. Law protecting children online in India includes —
A. IT Act + POCSO
B. Motor Act
C. RTI
D. GST
Answer: A

34. Reporting child abuse should be done to —
A. Cyber cell
B. Movie hall
C. Bank
D. Library
Answer: A


Social Engineering

35. Social engineering attacks target —
A. Hardware
B. Human psychology
C. RAM
D. CPU
Answer: B

36. Phishing is —
A. Fishing game
B. Fake email to steal data
C. Coding method
D. Antivirus
Answer: B

37. Pretexting means —
A. Creating fake story to get info
B. Writing code
C. Text formatting
D. Encryption
Answer: A

38. Baiting attack uses —
A. Free offers to trap users
B. Firewalls
C. Passwords
D. Backup
Answer: A

39. Tailgating means —
A. Following someone physically to gain access
B. Driving fast
C. Data backup
D. System reboot
Answer: A

40. OTP sharing leads to —
A. Security
B. Account compromise
C. Faster login
D. Encryption
Answer: B


Mixed Cyber Ethics & Law

41. Strong password is part of —
A. Computer ethics
B. Hardware design
C. Graphics
D. Printing
Answer: A

42. Identity theft is —
A. Legal
B. Cyber crime
C. Optimization
D. Backup
Answer: B

43. Using others’ Wi-Fi without permission is —
A. Ethical
B. Unethical
C. Required
D. Standard
Answer: B

44. Cyber stalking is —
A. Gardening
B. Online harassment
C. Coding
D. Testing
Answer: B

45. Fake websites are used for —
A. Phishing
B. Gaming
C. Teaching
D. Streaming
Answer: A

46. Encryption helps in —
A. Data security
B. Data theft
C. Piracy
D. Plagiarism
Answer: A

47. Firewall is used for —
A. Cooking
B. Network protection
C. Printing
D. Coding
Answer: B

48. Ethical hackers are also called —
A. Black hats
B. White hats
C. Pirates
D. Crackers
Answer: B

49. Sharing licensed software publicly is —
A. Legal
B. Software piracy
C. Backup
D. Debugging
Answer: B

50. Best defense against social engineering —
A. Awareness & verification
B. Fast typing
C. More RAM
D. Color monitor
Answer: A

=========================================================== 

Post a Comment

0 Comments