InterviewSolution
This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.
| 51. |
Complete the following web. |
|
Answer» 1. Use the Internet for the knowledge base. 2. Use the Internet to communicate messages. 3. Respect the privacy of other users on the Internet. 4. Download legitimate and authentic programs from the Internet. 5. Use licensed software on your computer. 6. Check to see if the web address begins with https:// whenever you sign in. 7. Report and flag content that is abusive or illegal. |
|
| 52. |
What care should be taken by the user while doing online activities? |
|
Answer» 1. Stick to copyright restrictions when downloading anything from the internet. 2. Use strong passwords with combinations of numbers. Uppercase and lowercase letters and special characters. 3. Always scan files before opening them. 4. Don’t talk to strangers. 5. Think before posting something on social media related to any sensitive topic like politics, religion, etc. 6. Report to the service provider if the account is hacked; if possible deactivate your account. 7. Whenever you sign in online check if the web address begins with https: // |
|
| 53. |
Explain three examples related to unauthorized access? |
|
Answer» 1. Hacking financial/bank account-related information. 2. Stealing organizational/intellectual information. 3. Illegal monitoring of information owned by other users. 4. Illegal use/break of login and password of other users. 5. Causing intentional irritation to other users by means of damaging software and important information. |
|
| 54. |
Gaining access without the users’ permission is known as __________ |
|
Answer» Unauthorized Access |
|
| 55. |
Define the terms (1) Ethics (2) Moral |
|
Answer» Ethics: Ethics also called moral philosophy is the discipline concerned with what is morally good and bad, right or wrong. Moral: The standards of behaviour; principles of right and wrong behaviour. Thus morals are dictated by society, culture, or religion while ethics are chosen by the person himself which governs his life. |
|
| 56. |
__________ means granting access rights to resources. |
|
Answer» Authorization |
|
| 57. |
The __________ have a major impact on EBusinesses and the new economy in India. |
|
Answer» Correct Answer is Cyber laws |
|
| 58. |
Thus __________ are dictated by society, culture or religion while __________ are chosen by the person himself which governs his life. (A) Authentication (B) Laws (C) Electronic record (D) Morals (E) Ethics |
|
Answer» (D) Morals, (E) Ethics D.Morals E.Ethics
|
|
| 59. |
Thus __________ are dictated by society, culture or religion. |
|
Answer» Correct Answer is Morals |
|
| 60. |
__________ is also called moral philosophy is the discipline concerned with what is morally good and bad, right or wrong. |
|
Answer» Correct Answer is Ethics |
|
| 61. |
The __________ have a major impact on EBusinesses and the new economy in India. (A) Information Technology Act, 2000(B) Cyber Laws (C) Digital signature (D) Digital Certificate |
|
Answer» (B) Cyber Laws |
|
| 62. |
Gaining access without the users’ permission is known as __________(A) Software piracy (B) Unauthorized access (C) Authorization (D) Copyright |
|
Answer» (B) Unauthorized access |
|
| 63. |
True or False:1. Thus Morals are dictated by society, culture, or religion.2. Computer Crime is alternatively referred to as Hacker. |
|
Answer» 1. True 2. False |
|
| 64. |
Thus __________ are dictated by society, culture or religion. (A) Ethics (B) Morals(C) Society (D) Culture |
|
Answer» Correct option is (B) Morals |
|
| 65. |
The also aims to provide for the legal framework. (A) Information Technology Act, 2000 (B) Cyber Laws (C) Digital signature (D) Digital Certificate |
|
Answer» (A) Information Technology Act, 2000 |
|
| 66. |
True or False:1. Morals are also called moral philosophy is the discipline concerned with what is morally good and bad, right or wrong.2. Ethics is the standards of behaviour; principles of right and wrong behaviour. |
|
Answer» 1. False 2. False |
|
| 67. |
Computer Crime is alternatively referred to as __________ (A) Cybercrime (B) Hacker (C) Computer crime (D) Illegal Act |
|
Answer» (A) Cybercrime |
|
| 68. |
A __________ who illegally browses or steals a company’s or individual’s private information. |
|
Answer» Correct Answer is Hacker |
|
| 69. |
__________ has been replaced with the electronic signature to make it a more technology-neutral act. (A) Information Technology Act, 2000 (B) Cyber laws (C) Digital Signature (D) Digital Certificate |
|
Answer» (C) Digital Signature |
|
| 70. |
The Information Technology Act 2000 attempts to change outdated __________ and provides ways to deal with __________ (A) Authentication (B) Laws (C) Electronic record (D) Cybercrimes (E) Morals |
|
Answer» (B) Laws, (D) Cybercrimes |
|
| 71. |
__________ includes stealing of codes/programs and other information illegally and creating the imitated copy by unauthorized means. (A) Software piracy (B) Unauthorized access (C) Authorization (D) Copyright |
|
Answer» (A) Software piracy |
|
| 72. |
True or False:1. The Information Technology Act offers the much-needed legal framework so that information is not denied.2. The Computer Act has also proposed a legal framework for the authentication and origin of an electronic records. |
|
Answer» 1. True 2. False |
|
| 73. |
Computer crime is an act performed by a knowledgeable computer user, sometimes referred to as a __________ (A) Cybercrime (B) Hacker (C) Computer crime (D) Illegal Act |
|
Answer» Correct option is (B) Hacker |
|
| 74. |
The cracker will use a program or script known as a __________ |
|
Answer» Correct Answer is Crack |
|
| 75. |
The __________ attempts to change outdated laws and provides ways to deal with cybercrimes. (A) Information Technology Act 2000 (B) Cyber Rule (C) Computer Act (D) Legal Act |
|
Answer» (A) Information Technology Act 2000 |
|
| 76. |
The attempts to change outdated laws and provides ways to deal with cybercrimes. |
|
Answer» Information Technology Act 2000 |
|
| 77. |
A __________ who illegally browses or steals a company’s or individual’s private information. (A) Cybercrime (B) Hacker (C) Computer crime (D) Illegal Act |
|
Answer» Correct option is (B) Hacker |
|
| 78. |
__________ has been replaced with the electronic signature to make it a more technology-neutral act. |
|
Answer» Digital Signature |
|
| 79. |
True or False:1. Cyberlaw covers a fairly broad area, encompassing several subtopics including freedom of expression, access to and usage of the Internet, and online privacy.2. The Information Technology Act 2000 attempts to change outdated laws and provides ways to deal with cybercrimes. |
|
Answer» 1. True 2. True |
|
| 80. |
__________ can involve criminal activities that are traditional in nature, such as theft, fraud, forgery, defamation, and mischief. (A) Cybercrimes (B) Hacker (C) Computer crime (D) Illegal Act |
|
Answer» (A) Cybercrimes |
|
| 81. |
True or False:1. Cybercrimes can involve criminal activities that are traditional in nature, such as theft, fraud, forgery, defamation, and mischief.2. Software piracy is nothing but copyright violation of software created originally by an individual or an institution. |
|
Answer» 1. True 2. True |
|
| 82. |
The cracker will use a program or script known as a __________ (A) Cracking (B) Crack (C) Cyberstalking (D) Phishing |
|
Answer» Correct option is (B) Crack |
|
| 83. |
True or False:1. Criminal Law is the area of law that deals with the Internet’s relationship to technological and electronic elements.2. Cyberlaw is the part of the overall legal system that deals with the Internet, cyberspace, and their respective legal issues. |
|
Answer» 1. False 2. True |
|
| 84. |
__________ is a criminal practice where an individual uses the Internet to systematically harass or threaten someone. (A) Cracking (B) Crack(C) Cyberstalking (D) Phishing |
|
Answer» (C) Cyberstalking |
|
| 85. |
__________ is a criminal practice where an individual uses the Internet to systematically harass or threaten someone. |
|
Answer» Cyberstalking |
|
| 86. |
True or False:1. Plagiarism is presenting someone else’s work or idea as your own without their consent.2. Hacking refers to unauthorized intrusion into a computer or a network. |
|
Answer» 1. True 2. True |
|
| 87. |
True or False:1. Hacker is a person intensely interested in the deep and hidden or concealed working of any computer operating system and programming language.2. Encryption is a method of converting the original message into random text. |
|
Answer» 1. True 2. True |
|
| 88. |
The __________ Act has also proposed a legal framework for the authentication and origin of an electronic records. (A) Cyber Rule (B) Information Technology (C) Computer Act (D) Legal Act |
|
Answer» (B) Information Technology |
|
| 89. |
Through the __________, transmission of data is encrypted. |
|
Answer» Secure Socket Layer |
|
| 90. |
__________ refers to unauthorised intrusion into a computer or a network. |
|
Answer» Correct Answer is Hacking |
|
| 91. |
Hacking refers to unauthorised intrusion into a __________ or a __________ (A) Computer (B) Credit Card Numbers (C) Network (D) Username Password (E) Programming Language |
|
Answer» (A) Computer, (C) Network |
|
| 92. |
__________ refers to unauthorised intrusion into a computer or a network. (A) Plagiarism (B) Hacking (C) Hacker (D) Cracking |
|
Answer» Correct option is (B) Hacking |
|
| 93. |
__________ owners have the right to control the reproduction of their work, including the right to receive the royalty payment for that reproduction. |
|
Answer» Correct Answer is Copyright |
|
| 94. |
Firewall refers to network security __________ and __________ system which blocks certain type of information. (A) Original (B) Random (C) Hardware (D) Software (E) Electronic communication |
|
Answer» (C) Hardware, (D) Software |
|
| 95. |
True or False:1. Copyright owners have the right to control the reproduction of their work, including the right to receive the royalty payment for that reproduction.2. Activity such as decipher codes or passwords and breaking security systems for illegal reasons is called copyright. |
|
Answer» 1. True 2. False |
|
| 96. |
Activity such as __________ or __________ and breaking security systems for illegal reasons is called cracking.(A) Operating system (B) Programming language (C) Individual (D) Decipher Codes (E) Passwords |
|
Answer» (D) Decipher Codes, (E) Passwords |
|
| 97. |
__________ is nothing but copyright violation of software created originally by an individual or an institution. |
|
Answer» Correct Answer is Software piracy |
|
| 98. |
Software piracy is nothing but copyright violation of software created originally by an __________ or an __________ (A) Operating system (B) Programming language (C) Individual (D) Institution (E) Passwords |
|
Answer» (C) Individual, (D) Institution |
|