1) The Information Technology (IT) Act, 2000, is the primary law in India dealing with: a) Intellectual Property Rights enforcement in all sectors b) Cybercrime and electronic commerce c) Telecommunication tariffs and spectrum allocation d) Physical property transactions involving computers. 2) Which of the following is an example of an Active Digital Footprint? a) Your IP address logged by a server b) A comment you posted on a friend's blog c) Cookies stored by a website on your device d) Metadata automatically generated by a photo taken with your phone 3) A security company identifies a new type of malware disguised as a system update utility. Once installed, it doesn't replicate but creates a backdoor for a hacker to remotely control the system. Based on its deceptive initial action, this malware is best classified as a: a) Virus b) Adware c) Trojan Horse d) Phishing 4) What is the primary objective of using 2FA (Two-Factor Authentication) for online accounts? a) To ensure the account is compliant with government regulations b) To allow two people to access the same account simultaneously c) To add an extra layer of security requiring something you know and something you have d) To prevent the spread of malware and viruses 5) The continuous collection and retention of users' browsing history, location data, and search queries by an application, even if anonymized, poses the greatest risk to which fundamental ethical concept? a) Data Confidentiality b) Data Privacy c) Digital Rights Management (DRM) d) Intellectual Property Rights (IPR) 6) Which scenario best illustrates the creation of a Passive Digital Footprint? a) Writing a negative product review on an e-commerce website b) Allowing a website to save a cookie that tracks your viewing time on different pages c) Signing up for a newsletter using your primary email address d) Deleting an old social media account you no longer use 7) What is the fundamental difference between a Trojan Horse and a Ransomware attack? a) A Trojan Horse replicates itself rapidly, while Ransomware does not replicate b) A Trojan Horse is designed for espionage/backdoor access, while Ransomware is designed to encrypt files for financial extortion c) Ransomware primarily targets government systems, while Trojans target individual users d) A Trojan Horse only uses social engineering, while Ransomware relies on network intrusion 8) As a responsible Netizen, which of the following actions fulfill both a legal requirement (under IPR/IT Act) and an ethical obligation? (Select all that apply) a) Giving proper credit and citations when using information from Wikipedia in a school report b) Always checking the E-waste label on a device and disposing of it through a certified recycler c) Not downloading and distributing movies that are still protected under Copyright d) Choosing a GPL license for an open-source project to ensure future derivatives remain open e) Reporting instances of severe Cyber Bullying to the appropriate school or legal authorities 9) Scenario: A company creates a new software utility that significantly improves network security. They want to protect the unique code of this utility for 20 years but allow any other programmer to use the idea or process described in the code without penalty. Which type of Intellectual Property protection is most suitable for their goal? a) Copyright(©) b) Trademark(™) c) Patent d) Creative Commons (CC) 10) When discussing the Digital Divide in society, which of the following issues are considered key components of the divide and are directly relevant to ethical computing and social equity? (Select all that apply) a) Disparity in access to high-speed internet and necessary hardware (e.g., computers/smartphones) b) Disparity in the average global selling price of smartphones and laptops c) Disparity in digital literacy and skills required to effectively use technology d) Disparity in the gender ratio of students enrolling in Computer Science programs
0%
Quiz on Society, Laws and Ethics by Jashdeep Singh
공유
공유
공유
만든이
Jashdeepsingh62
Class 11
Computer
콘텐츠 편집
인쇄
퍼가기
더보기
할당
순위표
더 보기
접기
이 순위표는 현재 비공개입니다.
공유
를 클릭하여 공개할 수 있습니다.
자료 소유자가 이 순위표를 비활성화했습니다.
옵션이 자료 소유자와 다르기 때문에 이 순위표가 비활성화됩니다.
옵션 되돌리기
퀴즈
(은)는 개방형 템플릿입니다. 순위표에 올라가는 점수를 산출하지 않습니다.
로그인이 필요합니다
비주얼 스타일
글꼴
구독 필요
옵션
템플릿 전환하기
모두 표시
액티비티를 플레이할 때 더 많은 포맷이 나타납니다.
결과 열기
링크 복사
QR 코드
삭제
자동 저장된
게임을 복구할까요?