1) The Information Technology (IT) Act, 2000, is the primary law in India dealing with: a) Intellectual Property Rights enforcement in all sectors b) Cybercrime and electronic commerce c) Telecommunication tariffs and spectrum allocation d) Physical property transactions involving computers. 2) Which of the following is an example of an Active Digital Footprint? a) Your IP address logged by a server  b) A comment you posted on a friend's blog c) Cookies stored by a website on your device d) Metadata automatically generated by a photo taken with your phone 3) A security company identifies a new type of malware disguised as a system update utility. Once installed, it doesn't replicate but creates a backdoor for a hacker to remotely control the system. Based on its deceptive initial action, this malware is best classified as a: a) Virus b) Adware c) Trojan Horse d) Phishing 4) What is the primary objective of using 2FA (Two-Factor Authentication) for online accounts? a) To ensure the account is compliant with government regulations b) To allow two people to access the same account simultaneously c) To add an extra layer of security requiring something you know and something you have d) To prevent the spread of malware and viruses 5) The continuous collection and retention of users' browsing history, location data, and search queries by an application, even if anonymized, poses the greatest risk to which fundamental ethical concept? a) Data Confidentiality b) Data Privacy c) Digital Rights Management (DRM) d) Intellectual Property Rights (IPR) 6) Which scenario best illustrates the creation of a Passive Digital Footprint? a) Writing a negative product review on an e-commerce website b) Allowing a website to save a cookie that tracks your viewing time on different pages c) Signing up for a newsletter using your primary email address d) Deleting an old social media account you no longer use 7) What is the fundamental difference between a Trojan Horse and a Ransomware attack? a) A Trojan Horse replicates itself rapidly, while Ransomware does not replicate b) A Trojan Horse is designed for espionage/backdoor access, while Ransomware is designed to encrypt files for financial extortion c) Ransomware primarily targets government systems, while Trojans target individual users d) A Trojan Horse only uses social engineering, while Ransomware relies on network intrusion 8) As a responsible Netizen, which of the following actions fulfill both a legal requirement (under IPR/IT Act) and an ethical obligation? (Select all that apply) a) Giving proper credit and citations when using information from Wikipedia in a school report b) Always checking the E-waste label on a device and disposing of it through a certified recycler c) Not downloading and distributing movies that are still protected under Copyright d) Choosing a GPL license for an open-source project to ensure future derivatives remain open e) Reporting instances of severe Cyber Bullying to the appropriate school or legal authorities 9) Scenario: A company creates a new software utility that significantly improves network security. They want to protect the unique code of this utility for 20 years but allow any other programmer to use the idea or process described in the code without penalty. Which type of Intellectual Property protection is most suitable for their goal? a) Copyright(©) b) Trademark(™) c) Patent  d) Creative Commons (CC) 10) When discussing the Digital Divide in society, which of the following issues are considered key components of the divide and are directly relevant to ethical computing and social equity? (Select all that apply) a) Disparity in access to high-speed internet and necessary hardware (e.g., computers/smartphones) b) Disparity in the average global selling price of smartphones and laptops c) Disparity in digital literacy and skills required to effectively use technology d) Disparity in the gender ratio of students enrolling in Computer Science programs

Quiz on Society, Laws and Ethics by Jashdeep Singh

Tabela

Vizuelni stil

Postavke

Promeni šablon

Vrati automatski sačuvano: ?