Unit- III Society Law and Ethics MCQs with answer
Syllabus:
Digital Footprints
Digital society and Netizen: net etiquettes, communication etiquettes, social media etiquettes
Data protection: Intellectual Property Right (copyright, patent, trademark), violation of IPR (plagiarism, copyright infringement, trademark infringement), open source softwares and licensing (Creative Commons, GPL and Apache)
Cyber-crime: definition, hacking, eavesdropping, phishing and fraud emails, ransomware, preventing cyber crime
1. What is Digital Footprint?
a) A scanned image of your foot.
b) A photograph of your shoe
c) All the information online about a person that is stored online.
d) Having a blog, facebook or twitter page
2. How many types of digital footprints.
a) 2
b) 3
c) 1
d) None of these
3. What is the information not share online?
a) Your fast name and last name.
b) Your photograph.
c) The name of your school or city.
d) All of the above.
4. Which of the following is not a type of cybercrime?
a) Data theft
b) Forgery
c) Damage to data and systems
d) Installing antivirus for protection.
5. Which of the following is not a typical characteristic of ethical hackers?
a) Excellent knowledge of windows
b) Understands the process of exploiting network vulnerabilities
c) Patience, persistence and perseverance
d) Has highest level of security for organization.
6. What is the most important activity in system hacking?
a) Information gathering
b) Cracking passwords
c) Escalating privileges
d) Covering tracks
7. Which is the following is not done by cyber criminals?
a) Unauthorized account access
b) Mass attack using Trojans as botnets.
c) Email spooling and spamming
d) Report vulnerability in any system
8. Which is the name of the IT law that India is having in the Indian legislature?
a) India’s Technology (IT) Act, 2000
b) India’s Digital Information (DIT) Act, 200
c) India’s Information Technology (IT) Act, 2000
d) The Technology Act, 2008
9. Passwords are used to improve the ______ of a network.
a) Performance
b) Reliability
c) Security
d) Longevity
10. The full form of Malware is
a) Malfunctioned software
b) Multipurpose software
c) Malicious software
d) Malfunctioning of security
11. The transformation of key business processes through the use of digital or Internet technologies is known as ____________
a) E-business
b) E-Commerce
c) Digital Business
d) Both A and C
12. A _________ community is one where the interaction takes place over a computer network, mainly the Internet.
a) Online
b) Virtual
c)Internet
d) All of the above
13. _________ has specific objectives to increase profits when increasing its benefits to society.
a) Digital Business
b) Social Network
c)Social Enterprise
d) Virtual Community
14. Social networks are organized primarily around __________.
a) Brands
b) People
c) Discussions
d) interests
15. Which social network is considered the most popular for social media marketing?
a) Twitter
b) Facebook
c) Linkdin
d) Whats App
16. Which of the following is an important aspect of creating blogs and posting content?
a) Using a witty user name
b) Posting at least once a month to the blog
c) Social Media Optimization
d) All of the above
17. Which of the following is the correct depiction of Digital Marketing?
a) E-mail Marketing
b) Social Media Marketing
c)Web Marketing
d) All of the above
18. Which of the following is not specifically required by the search engines?
a) Poor user experience
b) Keyword stuffing
c)Buying links
d) All of the above
19. Which of the following features corresponds to the role of the lead nurturing platform?
a) A/B Testing
b) Campaigning
c)Landing Page Creation
d) All of the above
20. Which of the following is the most common delivery channel in terms of mobile marketing?
a) Graphic
b) Text
c)Voice call
d) Search engine marketing
21. Which of the following is not threat?
a) Virus
b) Hacker
c) Hard disk failure
d) Operating system
22. Legal rights related to invention are called as———
a) Patent
b) Utility
c) a Trade secrets
d) Trade Marks
23. Intellectual property can termed as following type of property———-
a) Disposable
b) Tangible
c) measurable
d) Intangible
24. A software that can be freely accessed and modified.
a) Synchronous Software
b) Package Software
c) OSS
d) Middleware
25. Open Source Software can be used for commercial purpose.
a) True
b) False
26. OSI stands for?
a) Open Source Index
b) Open Source Image
c) Open Source Initiative
d) Open Source Instant
27. Which of the following is not an open source software?
a) LibreOffice
b) Microsoft Office
c) GNU image manipulation
d) MySQL
28. The users must agree to the _______ terms and agreements when they use an open source software.
a) System
b) License
c) Community
d) Programmer
Q29. An example of a web design OSS.
a) Nvu
b) KOffice
c) AbiWorld
d) Open Office
30. _____________ is a person who deliberately sows discord on the internet by starting quarrels or upsetting people, by posting inflammatory or off topic messages in an online community.
a) Netizen
b) Digital Citizen
c) Internet troll
d) None of the above
31. What does digital etiquette mean?
a) Making the most of your time online
b) Increasing your technological skills
c) Minding your manners in cyberspace
d) Trolling
32. When do you need to use etiquette?
a) When you are on your cell phone
b) When you send emails
c) When you send emails
d) All of the above
33. When writing email, using ALL CAPS means:
a) Your email is very important.
b) You are typing very quickly.
c) You are shouting.
d) You are an experienced email writer.
34. When posting pictures online, you should consider:
a) Whether or not others in the picture would want that picture posted
b) How the picture makes you look to others
c) Whether or not the picture could get anyone into trouble
d) All of the above
35. Blogging is a great way to tell people off when they make you mad or bother you.
a) True
b) False