Professional Documents
Culture Documents
Unit-3&4 Constitution ISA-2 Key
Unit-3&4 Constitution ISA-2 Key
2. a re a ttempts by i ndi vi dua l s to obta i n confi denti a l i nforma ti on from you to fa l s i fyi
ei r i denti ty.
a)Computer viruses
4, Hacking means:
) us e of i nforma ti on a nd communi ca ti on technol ogi es to s upport del i bera te, repea ted a nd
tile behavior
c) a form of fra ud or chea ti ng of a nother pers ons ' i denti ty i n vå l i ch s omeone pretends to
meone el s e by a s s umi ng tha t pers on's i denti ty.
page
6. are attempts by individuals to Obtain confidential informationfrom you to falsifying
ei r i denti ty.
Computer viruses
Phlshing trips
D. Spyware scams
are often delivered to a PC through an email attachment and are often designed to
harm.
Spam
. Email
Portals
a) Section66F
(b) Section 66B
c) Section660
Forge
Da ma ge to da ta syste
11. ich of the fol owing is not an example of a computeras weapon cyber-crirre?
Credit fraudule
IPR Violati
) Pornography
21P
uthor account
Mass attack using Trojans botne
Emai spoofing sparnnun
) Cyberspace—
) Pornogra*ly d) None ot these
y hacking web server taking cont on a person's we e ca ed as web
) Spoofing
) Spamming
) None of these.
) ema i l bombi ng
) Spamming
) Cyber stalking
17. he pra cti ce of ma ki ng a tra ns mi s s i on a ppea rs to come from a n a uthori zed us er,
) Hacking
) Spamming
) Spamdexing
18. e practice of forging a return address on an e-mail so that the recipient is fooled in
ealir,g private information[s termed?
) hacking
) cracking
) dumps ter di vi ng
False
31Page
20, iruses are programs that attach themselves to a computer or a file and then circulate
msetves to other files and to other computers on a network. They usually affect the da
a computer. either by altering or deleting it: this statement is:
) False
23. age of offence of child abuse is mentioned as years under IT Act, 2000.
) 14 years
) 16 years
) 21 years
24. o change. or change someoneor someihing,from one thiåg to anotheris
l i ed?
) Groomng
) Phishing
) Obscenity
wa res , ng are es
) Cyber Terronsm
) Cyber Warfare
) Phishing
26, yber stalking involves following a person's movements across the Internetby postir,g
essages (sometimes threatening)on the bulletin boards frequented by the victim, This
tatement is:
) False
Page
or
ignature etc. Punishment is three years imprisonment or fine of one lakh rupees or both
is offence is a form of?
) Hacking
) Cyber Stalkig
) Denial o' Service Attack.
20¯- ntellectualpropertyUP) referså"reåiiåris as:
) Inventions
) l i tera ry a nd a rti s ti c works
) designs: and symbols, names and images used in commerce
) IFR i s es s enti a l for better i denti fi ca ti on.pl a rul i ng, commerci a l i za ti on, renderi ng, a r•d
e pres erva ti on of i nventi ons or crea ti vi ty.
) to protect the investment. time, money. and effort invested by the inventor/creator Of the
) Copynqht
) Geogra phi ca l Indi ca ti on
) Trademark
atent gran
) 10 years
) 15 years
) Li fe ti me
51page
33. f6i16WiiWßGÅ6iGQéhiedi8&G1fringementof pateht?
) Injuncti on
) Damages
) Accounts of profi t
34. e s et of excl us i ve ri ghts gra nted to the a uthor or crea tor of a n ori gi na l work, i ncl udi ng the
t to copy, dl s tnbute a nd a da pt the work i s ca l l ed
) Trademark
36. Distinctive symbols. signs. logos that help consumer to distinguish between competing
or services is called
) Patent
) Copyright
) Cyber cri me
38. ny i ndi ca ti ons whi ch defi ne the goods a s ori gi na ti ng i n the terri tory of a country or a regi on
l oca l i ty i n tha t terri tory, provi ded a gi ven qua l i ty reputa tm or other cha ra cteri s ti cs of
duct a re a ttri buta bl eto i ts geogra phi ca l ori gi n i s ca l l ed:
) Trademark
) Pa tents
) Indus tri a l des i gn
39. Design protectiondeals with the outer appearance of an article, including decoration, lines,
rs, shape, textureand materials
) False
eograp to
) Kadri Pak
) Bangalore Pak
) None of theoptions
) Industrial design
) Tw04mensional design
) Trademark
42. Intellectual Property Rights (PR) protect the use of informationand ideas that are
of
a) Ethical value
b) Moral value
c) Social value
rade
a) is represented graphically
a) Tangible Property
b) Intellectual Property
c) Industrialprcuerty
71Page
46. In the following case the Hon'ble Supreme Court struck down Section 66 A of LT.
49. hat does not fall under the ambit of Identity Theft?
) Illegally obtaining the personal or financial informationof another person
) Fraudulent actions
) None of theoptJons
BIP
QUESTIONS
By proper planning you can
By what is one of the following ways can you help to reduce safety risks for
our organization's activities?
a) Nature Centric
b) Human Centric
c) Bio Centric
) All of the options
a) Utilitarianism
b) Environmentalism
c) Pollution control
d) Aestheticism
a) Environmental waste
b) Equipment waste
c) Electronic waste
) Engineeringwaste
a) Nature Centric
b) Human Centric
c) Bio Centric
d) All of the options
wo approaches to environmental ethics are:
a) Struggle
b) Moonlighting
c) IndustrialEspionage
) Price Fixing
) The Engineer shall regard his duty to the public welfare as paramount to all
ther obligations.
b) The Engineer shall regard his duty to the objectives of the company as
paramount to all other obligations
) The Engineer shall regard his duty to his excellence as paramountto other
bligations.
written statement of policies and principles that guides the behavior of all
mployees is called:
a) Word of Ethics
b) Company's Code
c) Code of Ethics
) Ethics and Behavior code
a) Conflict of interest
b) Conceptual issue
c) Concern of interest
) Interaction rules
a) A code of ethics makes sure that all the members of a profession act ethically
at all times
b) A code of ethics communicatesthe principlesand expected behaviorof a
profession 's members
c) A code of ethics always includes standard of conduct
)A code of ethics is a book notfollowedstrictly.
Promoting what is good for oneself without caring societal relationships
can be termed
a) Ethical Egoism
b) Self control
c) Self Esteem
) Moral Authority
hat does risk assessment tell you?
In order to determine the risk, which of the following criterion should have
knowledge?
a) Knowledgeof Risk
b) Uncertainties in Design
c) Testing for Safety
) All the options.
n activity of a business firm which promotes philanthropic concerns is
identifies as part of their:
a) CorporateSocial Responsibility
b) Marketing plan
c) Profitenhancingplan
) Employee welfare plan.
- refers to the act of organization members, disclosing
informationon illegal and unethical practices within the organization
a) Oxymoron
b) Reporting
c) Whistleblowing
) Quickening
Corporate Social Responsibility is equally importantto:
a) Community
b) Company
c) Community and Country
) Community and society
Ethics —
a) Onlyi
b) Only ii
c) Both I and ii
) Neither ( nor ii
Which of the following is a reason for unethical behavior amongst employe
and employees?
a) Opportunity
b) Resource crunch
c) Attitude
All the options
hich of the following is not a reason for poor attitude amongst employees?
a) Identificationof the moral factors and reasons. Identifythe relevant moral value
from among duties, rights, goods and obligations. Professional code of ethics may b
referred.
c)Rank the moral options i.e., priority in application through value system.
a) self-determinant
b) Dependent
c) Conflicted
) Confused
hich of the following is not a skill associated with moral autonomy?
a) Oligopoly
b) No autonomy in the work place
c) Expertise and knowledge
) Mediocre training
a) Doing businesselectronically
b) Doing business
c) Sale ofgoods
d) All of the options
Which of the following is part of the four main types for e-commerce?
a) B2B
b) B2C
c) C2B
d) All of the options
a) B2B
b) B2C
c) C2B
d)C2C
a) marketing
b) advertising
c) supplying
d) all of the options
a) B2B
b) B2C
c)C2B
d)C2C
Which of the followi ng are advantages normally associated with B2B e-commerce?
a) Shorter cycletimes
b) Reduction incosts
c) Reaches wideraudiences
d) all of the options
a) encryption
b) decryption
c) e-cash
d) all theoptions
What is the name given to an interactive business providing a centralized market where many buyers
and suppliers can come together for e-commerce or commerce-related activities ?
a) Direct marketplace
b) B2B
c) B2C
d) Electronic marketplace
E-Contract is an agreementwith
a) Lawful consideration
b) Free consent
c) Withouthidden motive
d) All of the options
a) Click wrap
b) Bubble wrap
c) Shrink wrap
d) Browse wrap
a) Cyber Contract
b) Online Contract
c) Digital Contract
d) All of the options
contracts are license agreements or other terms and conditions which can only be
read and accepted by the consumer after opening the product.
a) Browse wrap
b) Shrink wrap
c) Click wrap
d) Bubble wrap
a) Competent parties
b) Reasonable terms and conditions
c) Free consent
d) Lawful consideration
a) Technology Mediated
b) Universality
c) Intercommunication
d) Non- delivery of Information
a) Delivery of Information
b) Electronic Completionof Business Processes
c) Virtual Communities
d) Physical limitation
Ubiquity of e-commerce refers to:
a) encryption
b) decryption
c) e-cash
d) all the options
a) Informationdensity
b) Ubiquity
c) Customization
d) Physical location limitation
Business Organization
Sup i s Order
Processing
Orders
Customer Website
a) B2C
b) B2B
c)C2B
d)C2C
Business Organization
Suppl i s
Processing
Website
Sens
a) B2C
b) B2B
c) C2B
d)C2C
The diagram denotes which model of e-commerce?
Website
receives products
a) B2C
b) B2B
c) C2B
d)C2C
Places advertisement
Website
receives products
Customer 1 Customer 2
Receives money
a) B2C
b) B2B
c) C2B
d) C2C
a) Damages;
b) specific performance of the contract; and
c) injunction
d) All of the options
a) Damages;
b) specific performance of the contract; and
c) injunction
d) Criminal prosecution
PKI is certified by
a) Certificate Authority
b) PKI Authority
c) Central Government
d) ISP
What are the conditions for validation of a e-contract under Section IOA of IT Act?
a) A and C only.
b) A and B only.
c) A, B and C.
d) B, C and D.
a) Using e-medias
b) Using computers only
c) Using mobilephones only
d) None of the options
a) marketing
b) advertising
c) warehousing
d) None of the options
Which of the following is a disadvantage of E-Commerce?
"The technology reaches Commerce is enabled across cultural and across nationa
boundaries, around the earth. National boundaries seamlessly and without modification"
The above statement is:
a) True
b) False
c) Somewhat True
d) None of the above
contracts are web-based contracts that require the user's consent or consent
through the "1Accept," or "OK" button.
a) Shrink wrap
b) Click wrap
c) Browsing wrap
d) None of the above
a) E-mails
b) Website forms
c) EULA
d) All of the above
a) First
b) Second
c) Third
d) Fourth
a) E-mail ID Certificate
b) Website Certificate
c) Digital Signature Certificate
d) None of the above