1) The Information Technology (IT) Act, 2000, is the primary law in India dealing with: a) Intellectual Property Rights enforcement in all sectors b) Cybercrime and electronic commerce c) Telecommunication tariffs and spectrum allocation d) Physical property transactions involving computers. 2) Which of the following is an example of an Active Digital Footprint? a) Your IP address logged by a server b) A comment you posted on a friend's blog c) Cookies stored by a website on your device d) Metadata automatically generated by a photo taken with your phone 3) A security company identifies a new type of malware disguised as a system update utility. Once installed, it doesn't replicate but creates a backdoor for a hacker to remotely control the system. Based on its deceptive initial action, this malware is best classified as a: a) Virus b) Adware c) Trojan Horse d) Phishing 4) What is the primary objective of using 2FA (Two-Factor Authentication) for online accounts? a) To ensure the account is compliant with government regulations b) To allow two people to access the same account simultaneously c) To add an extra layer of security requiring something you know and something you have d) To prevent the spread of malware and viruses 5) The continuous collection and retention of users' browsing history, location data, and search queries by an application, even if anonymized, poses the greatest risk to which fundamental ethical concept? a) Data Confidentiality b) Data Privacy c) Digital Rights Management (DRM) d) Intellectual Property Rights (IPR) 6) Which scenario best illustrates the creation of a Passive Digital Footprint? a) Writing a negative product review on an e-commerce website b) Allowing a website to save a cookie that tracks your viewing time on different pages c) Signing up for a newsletter using your primary email address d) Deleting an old social media account you no longer use 7) What is the fundamental difference between a Trojan Horse and a Ransomware attack? a) A Trojan Horse replicates itself rapidly, while Ransomware does not replicate b) A Trojan Horse is designed for espionage/backdoor access, while Ransomware is designed to encrypt files for financial extortion c) Ransomware primarily targets government systems, while Trojans target individual users d) A Trojan Horse only uses social engineering, while Ransomware relies on network intrusion 8) As a responsible Netizen, which of the following actions fulfill both a legal requirement (under IPR/IT Act) and an ethical obligation? (Select all that apply) a) Giving proper credit and citations when using information from Wikipedia in a school report b) Always checking the E-waste label on a device and disposing of it through a certified recycler c) Not downloading and distributing movies that are still protected under Copyright d) Choosing a GPL license for an open-source project to ensure future derivatives remain open e) Reporting instances of severe Cyber Bullying to the appropriate school or legal authorities 9) Scenario: A company creates a new software utility that significantly improves network security. They want to protect the unique code of this utility for 20 years but allow any other programmer to use the idea or process described in the code without penalty. Which type of Intellectual Property protection is most suitable for their goal? a) Copyright(©) b) Trademark(™) c) Patent d) Creative Commons (CC) 10) When discussing the Digital Divide in society, which of the following issues are considered key components of the divide and are directly relevant to ethical computing and social equity? (Select all that apply) a) Disparity in access to high-speed internet and necessary hardware (e.g., computers/smartphones) b) Disparity in the average global selling price of smartphones and laptops c) Disparity in digital literacy and skills required to effectively use technology d) Disparity in the gender ratio of students enrolling in Computer Science programs
0%
Quiz on Society, Laws and Ethics by Jashdeep Singh
共用
共用
共用
由
Jashdeepsingh62
Class 11
Computer
編輯內容
列印
嵌入
更多
作業
排行榜
顯示更多
顯示更少
此排行榜當前是私有的。單擊
共用
使其公開。
資源擁有者已禁用此排行榜。
此排行榜被禁用,因為您的選項與資源擁有者不同。
還原選項
測驗
是一個開放式範本。它不會為排行榜生成分數。
需要登錄
視覺風格
字體
需要訂閱
選項
切換範本
顯示所有
播放活動時將顯示更多格式。
打開結果
複製連結
QR 代碼
刪除
恢復自動保存:
?