

McqMate
These multiple-choice questions (MCQs) are designed to enhance your knowledge and understanding in the following areas: Bachelor of Commerce (B Com) .
151. |
The reverse process of encryption, to make the information readable once again is: |
A. | Sniffing |
B. | Decryption |
C. | Cryptography |
D. | Translation153. |
Answer» B. Decryption |
152. |
An Electronic Check is one form of what? |
A. | Ecommerce |
B. | Online Banking |
C. | E-cash |
D. | Check |
Answer» B. Online Banking |
153. |
A combination of software and information designed to provide security and information for payment is called? |
A. | Digital wallet |
B. | Pop up ads |
C. | Shoppng cart |
D. | Encryption |
Answer» A. Digital wallet |
154. |
A ………………is an electronic file that uniquely identifies individuals and websites on the internet and enables secure confidential communications |
A. | Digital signature |
B. | Digital certificates |
C. | SSL |
D. | none of these |
Answer» B. Digital certificates |
155. |
……………………….is a person who breaks in or trespasses a computer system |
A. | Hacker |
B. | Snooper |
C. | operator |
D. | spoofer |
Answer» A. Hacker |
156. |
E-mail which contain useless material is termed as…………… |
A. | Spam |
B. | useless mail |
C. | trunk mail |
D. | Junk mail |
Answer» A. Spam |
157. |
What is Biometrics ? |
A. | It is a branch of biology |
B. | It recognizes individuals based on their inherent physical or behavioral characteristics. |
C. | a)&b). |
D. | None of these |
Answer» B. It recognizes individuals based on their inherent physical or behavioral characteristics. |
158. |
SET means ……………… |
A. | Standard Electronic Technology |
B. | Standard Electronic Transfer |
C. | Secure Electronic Transaction |
D. | None of these |
Answer» B. Standard Electronic Transfer |
159. |
Patents protects |
A. | Expression of an idea |
B. | Inventions. |
C. | Books and Articles |
D. | Company Logo |
Answer» B. Inventions. |
160. |
The minimum punishment for an infringement of copyright in India is |
A. | 3 months imprisonment and minimum of Rs 50,000 fine |
B. | 3 months imprisonment and minimum of Rs 60,000 fine |
C. | 6 months imprisonment and minimum of Rs 50,000 fine. |
D. | 6 months imprisonment and minimum of Rs 30,000 fine |
Answer» C. 6 months imprisonment and minimum of Rs 50,000 fine. |
161. |
A________ is a right, granted by the government, to exclude others from making, using, or selling your invention |
A. | Copyright |
B. | Patents. |
C. | Trademark |
D. | Trade Secret |
Answer» B. Patents. |
162. |
TheTerm of every patent in India is |
A. | 50 years |
B. | 40 years |
C. | 30 years |
D. | 20 years. |
Answer» D. 20 years. |
163. |
The Trademarks Act 1999 protects well-known trademarks from: |
A. | an action against the registration of similar marks. |
B. | an action against the misuse of someones identity |
C. | an action against copying someones lyrics |
D. | All of the above |
Answer» A. an action against the registration of similar marks. |
164. |
The penalties for infringement of Trademarked content in India |
A. | Minimum 3 months imprisonment and fine of INR 20,0000 |
B. | Minimum 4 months imprisonment and fine of INR 30,0000 |
C. | Minimum 5 months imprisonment and fine of INR 40,0000 |
D. | Minimum 6 months imprisonment and fine of INR 50,0000. |
Answer» D. Minimum 6 months imprisonment and fine of INR 50,0000. |
165. |
When did IT Act 2000 came into effect |
A. | October 17, 2000. |
B. | October 17, 2001 |
C. | November 11, 2000 |
D. | November 11, 2001 |
Answer» A. October 17, 2000. |
166. |
How many schedules are there in IT Act 2000 |
A. | 3 |
B. | 4. |
C. | 5 |
D. | 6 |
Answer» B. 4. |
167. |
Trade mark, copyright, patent law etc comes under the purview of…………………… |
A. | Data protection |
B. | Telecommunication laws |
C. | Intellectual property laws |
D. | None |
Answer» C. Intellectual property laws |
168. |
Which of the following is an example of Intellectual property ? |
A. | Patent |
B. | Trade Marks |
C. | Copyright |
D. | All of above |
Answer» D. All of above |
169. |
Copyright protection is available for |
A. | Literary work |
B. | Musical work |
C. | Artistic work |
D. | All the above |
Answer» D. All the above |
170. |
Plan of a building can be protected by |
A. | Copyright |
B. | Patent |
C. | Trade secret |
D. | Industrial Design |
Answer» A. Copyright |
171. |
Copyright protects |
A. | Idea |
B. | Expression |
C. | Both a) and b) |
D. | None of the above |
Answer» B. Expression |
172. |
Patent of addition can be filed by |
A. | Inventor |
B. | Patentee |
C. | Both a) and b) |
D. | None of the above |
Answer» C. Both a) and b) |
173. |
What is the updated version of the IT Act, 2000? |
A. | IT Act, 2007 |
B. | Advanced IT Act, 2007 |
C. | IT Act, 2008 |
D. | Advanced IT Act, 2008 |
Answer» C. IT Act, 2008 |
174. |
_______ is a recognizable insignia, phrase, word, or symbol that denotes a specific product and legally differentiates it from all other products of its kind. |
A. | Censorship |
B. | Patent |
C. | Trademark |
D. | Copyright |
Answer» C. Trademark |
175. |
An unauthorised entry into other people’s electronic device is called |
A. | Spamming |
B. | Hacking |
C. | Copyrighting |
D. | Breaching |
Answer» B. Hacking |
176. |
Gaining control of client computer through network is called |
A. | Snooping |
B. | Sniffing |
C. | Buffing |
D. | Dialling |
Answer» A. Snooping |
177. |
A copyright owner can give authority to anyone to |
A. | Duplicate intellectual property |
B. | Process intellectual property |
C. | Copy intellectual property |
D. | Sell intellectual property |
Answer» C. Copy intellectual property |
178. |
Patent right gives the sole authority to produce for |
A. | Consumers |
B. | Investors |
C. | Industry |
D. | Inventors |
Answer» D. Inventors |
179. |
Trademark uniquely differentiate products from other |
A. | Inventors |
B. | Products |
C. | Investors |
D. | Pioneers |
Answer» B. Products |
180. |
Which one of this is not used for trademarking products |
A. | Logo |
B. | Words |
C. | Feature |
D. | Symbol |
Answer» C. Feature |
181. |
When some words, pictures or videos is banned from public notice it is called |
A. | Spamming |
B. | Censorship |
C. | Authentication |
D. | Hiding |
Answer» B. Censorship |
182. |
When unwanted or unexpected email or messages is sent to an electronic device it is known as |
A. | Bulk message |
B. | Phishing |
C. | Advertising |
D. | Spamming |
Answer» D. Spamming |
183. |
The information Technology Act [IT ACT] came into effect on: |
A. | 16th November 2000 |
B. | 15th December 2000 |
C. | 17th October 2000 |
D. | 14th November 2000 |
Answer» C. 17th October 2000 |
184. |
A person who breaks in or trespasses a computer system: |
A. | Hacker |
B. | Snooper |
C. | Operator |
D. | Spoofer |
Answer» A. Hacker |
185. |
E-mail which contain useless material is termed as: |
A. | Spam Mail |
B. | Trunk Mail |
C. | Junk Mail |
D. | Inbox Mail |
Answer» C. Junk Mail |
186. |
Which of the following crimes were not covered under IT (Amendment) Act, 2008? |
A. | Cyber Terrorism |
B. | Child Pornography |
C. | Video voyeurism |
D. | None of these |
Answer» D. None of these |
187. |
Trade mark, copyright, patent law, etc. comes under the purview of: |
A. | Data Protection |
B. | Telecommunication Laws |
C. | Intellectual Property Laws |
D. | All of the above |
Answer» C. Intellectual Property Laws |
188. |
Which one of the following is not a principle of e-commerce? |
A. | Privacy |
B. | Integrity |
C. | Authentication |
D. | None of these |
Answer» D. None of these |
189. |
Which of the following is a program designed to replicate and spread generally with the victim being oblivious to its existence? |
A. | Hacker |
B. | Software |
C. | Computer Virus |
D. | Computer Anti-virus |
Answer» C. Computer Virus |
190. |
An electronic file that uniquely identifies individuals and websites on the internet and enables secure confidential communications is/are: |
A. | Digital Signature |
B. | Digital Certificates |
C. | SSL |
D. | None of these |
Answer» B. Digital Certificates |
191. |
India has enacted the first IT Act in the year…… |
A. | 2001 |
B. | 2002 |
C. | 2009 |
D. | 2000 |
Answer» D. 2000 |
192. |
Trade mark, copyright, patent law etc comes under the purview of……… |
A. | Data protection |
B. | Telecommunication laws |
C. | Intellectual property laws |
D. | None |
Answer» C. Intellectual property laws |
193. |
All of the following are examples of real security and privacy risks EXCEPT: |
A. | hackers. |
B. | spam. |
C. | viruses. |
D. | identity theft |
Answer» B. spam. |
194. |
Digital Cash has following characteristic |
A. | Anonymity |
B. | Security |
C. | Confidentiality |
D. | All of Above |
Answer» D. All of Above |
195. |
Who breaks into other people’s computer system and steals and destroys information: |
A. | Hackers |
B. | Software |
C. | Hacktivists |
D. | Script Kiddies |
Answer» A. Hackers |
196. |
Which process is used to re install data from a copy when the original data has been lost |
A. | Backup |
B. | Recovery |
C. | Bench marking |
D. | Data cleansing |
Answer» B. Recovery |
197. |
Which service encompasses all technologies used to transmit and process information on an across a network? |
A. | Interoperability |
B. | Scalability |
C. | Benchmarking |
D. | Web services |
Answer» D. Web services |
198. |
The practice of forging a return address on an e-mail so that the recipient is fooled into revealing private information is termed? |
A. | hacking |
B. | cracking |
C. | dumpster diving |
D. | spoofing |
Answer» D. spoofing |
Done Studing? Take A Test.
Great job completing your study session! Now it's time to put your knowledge to the test. Challenge yourself, see how much you've learned, and identify areas for improvement. Don’t worry, this is all part of the journey to mastery. Ready for the next step? Take a quiz to solidify what you've just studied.