Unit- III Society Law and Ethics Term 2 Important Questions with answer

Unit- III Society Law and Ethics Term 2 Important Questions with answer

 

Syllabus:

Digital Footprints

Digital society and Netizen: net etiquettes, communication etiquettes, social media etiquettes

Data protection: Intellectual Property Right (copyright, patent, trademark), violation of IPR (plagiarism, copyright infringement, trademark infringement), open source softwares and licensing (Creative Commons, GPL and Apache)

Cyber-crime: definition, hacking, eavesdropping, phishing and fraud emails, ransomware, preventing cyber crime

 

1. What is Digital Footprint?

a) A scanned image of your foot.

b) A photograph of your shoe

c) All the information online about a person that is stored online.

d) Having a blog, facebook or twitter page

 

c) All the information online about a person that is stored online.

 

 

2. How many types of digital footprints.

a) 2

b) 3

c) 1

d) None of these

a) 2

 

 

3. What is the information not share online?

a) Your fast name and last name.

b) Your photograph.

c) The name of your school or city.

d) All of the above.

d) All of the above.

 

 

4. Which of the following is not a type of cybercrime?

a) Data theft

b) Forgery

c) Damage to data and systems

d) Installing antivirus for protection.

d) Installing antivirus for protection.

 

 

5. Which of the following is not a typical characteristic of ethical hackers?

a) Excellent knowledge of windows

b) Understands the process of exploiting network vulnerabilities

c) Patience, persistence and perseverance

d) Has highest level of security for organization.

d) Has highest level of security for organization.

 

 

6. What is the most important activity in system hacking?

a) Information gathering

b) Cracking passwords

c) Escalating privileges

d) Covering tracks

b) Cracking passwords

 

 

7. Which is the following is not done by cyber criminals?

a) Unauthorized account access

b) Mass attack using Trojans as botnets.

c) Email spooling and spamming

d) Report vulnerability in any system

d) Report vulnerability in any system

 

 

8. Which is the name of the IT law that India is having in the Indian legislature?

a) India’s Technology (IT) Act, 2000

b) India’s Digital Information (DIT) Act, 200

c) India’s Information Technology (IT) Act, 2000

d) The Technology Act, 2008

c) India’s Information Technology (IT) Act, 2000

 

 

9. Passwords are used to improve the ______ of a network.

a) Performance

b) Reliability

c) Security

d) Longevity

c) Security

 

 

10. The full form of Malware is

a) Malfunctioned software

b) Multipurpose software

c) Malicious software

d) Malfunctioning of security

c) Malicious software

 

 

11. The transformation of key business processes through the use of digital or Internet technologies is known as ____________

a) E-business

b) E-Commerce

c) Digital Business

d) Both A and C

c) Digital Business

 

 

12. A _________ community is one where the interaction takes place over a computer network, mainly the Internet.

a) Online

b) Virtual

c)Internet

d) All of the above

d) All of the above

 

 

13. _________ has specific objectives to increase profits when increasing its benefits to society.

a) Digital Business

b) Social Network

c)Social Enterprise

d) Virtual Community

c)Social Enterprise

 

 

14. Social networks are organized primarily around __________.

a) Brands

b) People

c) Discussions

d) interests

b) People

 

 

15. Which social network is considered the most popular for social media marketing?

a) Twitter

b) Facebook

c) Linkdin

d) Whats App

b) Facebook

 

 

16. Which of the following is an important aspect of creating blogs and posting content?

a) Using a witty user name

b) Posting at least once a month to the blog

c) Social Media Optimization

d) All of the above

d) All of the above

 

 

17. Which of the following is the correct depiction of Digital Marketing?

a) E-mail Marketing

b) Social Media Marketing

c)Web Marketing

d) All of the above

d) All of the above

 

 

18. Which of the following is not specifically required by the search engines?

a) Poor user experience

b) Keyword stuffing

c)Buying links

d) All of the above

d) All of the above

 

 

19. Which of the following features corresponds to the role of the lead nurturing platform?

a) A/B Testing

b) Campaigning

c)Landing Page Creation 

d) All of the above

d) All of the above

 

 

20. Which of the following is the most common delivery channel in terms of mobile marketing?

a) Graphic

b) Text

c)Voice call

d) Search engine marketing

b) Text

 

 

21. Which of the following is not threat?

a) Virus

b) Hacker

c) Hard disk failure

d) Operating system

c) Hard disk failure

 

 

22. Legal rights related to invention are called as———

a) Patent

b) Utility

c) a Trade secrets

d) Trade Marks

a) Patent

 

 

23. Intellectual property can termed as following type of property———-

a) Disposable

b) Tangible

c) measurable

d) Intangible

d) Intangible

 

 

 

24. A software that can be freely accessed and modified.

a) Synchronous Software

b) Package Software

c) OSS

d) Middleware

c) OSS

 

 

25. Open Source Software can be used for commercial purpose.

a) True

b) False

a) True

 

 

26. OSI stands for?

a) Open Source Index

b) Open Source Image

c) Open Source Initiative

d) Open Source Instant

c) Open Source Initiative

 

 

27. Which of the following is not an open source software?

a) LibreOffice

b) Microsoft Office

c) GNU image manipulation

d) MySQL

b) Microsoft Office

 

 

28. The users must agree to the _______ terms and agreements when they use an open source software.

a) System

b) License

c) Community

d) Programmer

b) License

 

 

Q29. An example of a web design OSS.

a) Nvu

b) KOffice

c) AbiWorld

d) Open Office

a) Nvu

 

 

30. _____________ is a person who deliberately sows discord on the internet by starting quarrels or upsetting people, by posting inflammatory or off topic messages in an online community.

a) Netizen

b) Digital Citizen

c) Internet troll

d) None of the above

a) Netizen

 

 

31. What does digital etiquette mean?

a) Making the most of your time online

b) Increasing your technological skills

c) Minding your manners in cyberspace

d) Trolling 

c) Minding your manners in cyberspace

 

 

32. When do you need to use etiquette?

a) When you are on your cell phone

b) When you send emails

c) When you send emails

d) All of the above

d) All of the above

 

 

33. When writing email, using ALL CAPS means:

a) Your email is very important.

b) You are typing very quickly.

c) You are shouting.

d) You are an experienced email writer.

c) You are shouting.

 

 

34. When posting pictures online, you should consider:

a) Whether or not others in the picture would want that picture posted

b) How the picture makes you look to others

c) Whether or not the picture could get anyone into trouble

d) All of the above 

d) All of the above 

 

 

35. Blogging is a great way to tell people off when they make you mad or bother you.

a) True

b) False

b) False

 

 

Leave a Reply

Your email address will not be published. Required fields are marked *