SET – 2
1. The Information Technology Act 2000 is mainly
A. Intended to promote e-governance
B. Give legal recognition to e- transactions and EDI
C. Punish Cyber Criminals
D. A and B
E. A and C
2. Remedies available in case of Copyright Infringement
A. Civil Remedies
B. Criminal Remedies
C. All of the Above
D. Either A or B
3. Public Key System is useful because
A. It is a symmetric key system
B. It uses two keys
C. Private key can be a secret
D. There is no Key Distribution Problem as Public Key can be kept in a commonly
accessible database
4. ‘Fair use’ is a term most relevant to
A. Intellectual Property Rights
B. Books borrowed for home reading
C. Copy right
D. Use of reference books
5. Cyber Criminals come in the category of
A. Intruders
B. Hackers
C. Employees
D. All
6. A computer can act as
A. Crime
B. Evidence
C. None
D. Both
7. Various kinds of e-contracts include
A. Click Contracts
B. Shrink Contracts
C. Web Contracts
D. All
8. Patents are generally not granted to
A. Non obvious subject matter
B. Processes and Methods
C. Inventions that are new
D. Items that have Practical Use
9. Idea Expression Dichotomy means
A. Idea can be copyrighted
B. the formulation of thought on a particular subject
C. many persons may individually arrive at the same idea, they can claim copyright
D. the expression of idea can be copyrighted
10. In case of uploading a video, if it invades the privacy of a person exposing the person’s
private areas without such person’s consent, then it is covered under
A. Section 43 of IT Act
B. Section 85 of IT Act
C. Section 69 of IT Act
D. Section 66 E of IT Act
SET – 1
1. Cyber Crime is defined under Indian Cyber Law
A. True
B. False
2. Copyright law does not protect
A. Musical Works
B. Literary Works
C. Ideas or Concepts
D. Sound Recordings
3. Whether Intellectual Property can be sold
A. No
B. Sale is possible
C. Yes
D. None
4. To be considered a computer crimes, what needs to be involved in the crime
A. Technology
B. Computers
C. Data
D. Networks
5. Public key encryption method is a system
A. Which uses a set of public keys one for each participant in e-Commerce
B. Which uses the RSA coding system
C. In which each person who wants to communicate has two keys; a private key known to
him only and a public key which is publicized to enable others to send message to him
D. Which is a standard for use in e-Commerce.
6. The Information Technology Act, 2000 is concerned with :
A. Legal recognition of digital signatures
B. Definition of various types of computer crimes and penalties for the same
C. Appointment of certifying authorities for issuing digital signatures
D. Recognition of digital records and their admissibility as evidence in courts
E. All of the above
7. Patents are generally granted to
A. Inventions that are new
B. Non obvious subject matter
C. Processes and Methods
D. A and B
E. B and C
SET – 2
11. The Information Technology Act 2000 is mainly
F. Intended to promote e-governance
G. Give legal recognition to e- transactions and EDI
H. Punish Cyber Criminals
I. A and B
J. A and C
12. Remedies available in case of Copyright Infringement
E. Civil Remedies
F. Criminal Remedies
G. All of the Above
H. Either A or B
13. Public Key System is useful because
E. It is a symmetric key system
F. It uses two keys
G. Private key can be a secret
H. There is no Key Distribution Problem as Public Key can be kept in a commonly
accessible database
14. ‘Fair use’ is a term most relevant to
E. Intellectual Property Rights
F. Books borrowed for home reading
G. Copy right
H. Use of reference books
15. Cyber Criminals come in the category of
E. Intruders
F. Hackers
G. Employees
H. All
16. A computer can act as
E. Crime
F. Evidence
G. None
H. Both
17. Various kinds of e-contracts include
E. Click Contracts
F. Shrink Contracts
G. Web Contracts
H. All