1.
General Accepted standards of right and wrong in a society is called as ......
Correct Answer
A. Moral
Explanation
The correct answer is "moral" because moral refers to the accepted standards of right and wrong in a society. It encompasses principles and values that guide individuals' behavior and decision-making, based on concepts such as fairness, honesty, and respect for others. Ethics, guidelines, and code of standard may also be related to moral standards, but moral specifically refers to the overall accepted standards in a society.
2.
........... is a criterion used to decide what is right or wrong.
Correct Answer
A. Moral standard
Explanation
A moral standard is a criterion used to determine whether an action or behavior is right or wrong. It serves as a guideline or rule that individuals or societies use to evaluate their actions and make moral judgments. Moral standards are often based on cultural, religious, or personal beliefs and values. They provide a framework for ethical decision-making and help individuals navigate moral dilemmas by providing a standard against which actions can be measured.
3.
.........indicates rules and regulations to be obeyed in the organization.
Correct Answer
B. Law
Explanation
The term "law" refers to a set of rules and regulations that individuals are required to follow in a particular organization or society. These laws are legally binding and enforceable, often backed by consequences for non-compliance. In the context of the given question, "law" is the correct answer as it accurately represents the concept of rules and regulations that need to be obeyed within an organization.
4.
Code of ethics do not includes............
Correct Answer
A. Software Piracy
Explanation
The code of ethics typically outlines a set of moral principles and guidelines that individuals or organizations should adhere to in their professional conduct. Software piracy refers to the unauthorized copying, distribution, or use of copyrighted software, which is illegal and unethical. Therefore, it is reasonable to conclude that software piracy should not be included in the code of ethics as it goes against the principles of fairness, honesty, and respect for intellectual property rights.
5.
............provides norms and principles to the computer users and system professionals.
Correct Answer
A. Code of ethics
Explanation
The code of ethics provides norms and principles to computer users and system professionals, guiding their behavior and decision-making in the field. It sets standards for ethical conduct, such as respecting privacy and ensuring security. These guidelines help individuals navigate ethical dilemmas and promote responsible and professional behavior in the use and development of computer systems and technology.
6.
To make the exact copy of a program is termed as.............
Correct Answer
B. Software privacy
Explanation
The term "software privacy" refers to the protection of software from unauthorized access, use, or distribution. Making an exact copy of a program without permission would violate the software's privacy rights. Therefore, the correct answer is software privacy.
7.
The use of invasive software such as ............... destructs the computer system
Correct Answer
B. Worms's
Explanation
The use of invasive software such as worms's can destruct the computer system. Worms are a type of malicious software that can replicate themselves and spread across a network, causing damage to computer systems by consuming system resources, corrupting files, or even disabling the entire system. Therefore, the presence of worms's can lead to the destruction of the computer system.
8.
When a software is pirated, it harmes...........
Correct Answer
D. Software Developers
Explanation
When a software is pirated, it harms the software developers. Piracy involves the unauthorized copying, distribution, or use of software, which deprives the developers of their rightful income. It undermines their ability to earn a profit from their hard work and discourages future innovation. Additionally, piracy can lead to a loss of trust in the software industry and can negatively impact job opportunities for developers.
9.
Accessing data without permission is known as..........
Correct Answer
B. Unauthourized Access
Explanation
The correct answer is "unauthorized Access". This term refers to the act of accessing data or information without proper permission or authorization. It implies that the individual is gaining entry to a system or resource without the necessary rights or privileges. Unauthorized access is considered a violation of security protocols and can lead to legal consequences.
10.
.............. provides legal recognition of tranaction carried out by means of eletronic commerce.
Correct Answer
C. Cyber law
Explanation
Cyber law refers to the legal framework that governs electronic commerce and transactions conducted online. It provides legal recognition and validity to transactions carried out through electronic means, ensuring that they are legally binding and enforceable. Cyber law encompasses various aspects such as electronic contracts, digital signatures, online privacy, intellectual property rights, and cybercrime prevention. It aims to regulate and protect individuals, businesses, and organizations engaged in electronic commerce, ensuring a secure and trustworthy environment for online transactions.
11.
..................ensures that the document originated with the person signing it and that was not tampered with after the signature was applied.
Correct Answer
A. Digital Signature
Explanation
A digital signature ensures that the document originated with the person signing it and that it was not tampered with after the signature was applied. Unlike a simple signature, which can be easily forged or altered, a digital signature uses encryption techniques to securely sign the document and verify its integrity. This provides a higher level of security and authenticity compared to other types of signatures, such as coded, double, or simple signatures.
12.
.............refers to all the legal and regulatory aspects of internet and world wide web.
Correct Answer
B. Cyber law
Explanation
Cyber law refers to all the legal and regulatory aspects of the internet and the World Wide Web. It encompasses various laws and regulations that govern online activities, such as online transactions, privacy, intellectual property rights, and cybercrime. Cyber law is crucial in ensuring the security and protection of individuals and businesses in the digital space. It covers a wide range of legal issues related to technology and the internet, including electronic contracts, digital signatures, and online defamation. Therefore, cyber law is the correct answer as it encompasses all the legal and regulatory aspects of the internet and the World Wide Web.
13.
..............detects and prevents known viruses which weakens the computer.
Correct Answer
D. Anti-virus
Explanation
An anti-virus software is designed to detect and prevent known viruses that can weaken the computer. It scans files, programs, and websites for any malicious code or patterns that match with known viruses. By identifying and eliminating these viruses, the anti-virus software helps to protect the computer from potential damage or unauthorized access.
14.
..................license allows for installation of a program on a software.
Correct Answer
B. Network
Explanation
A network license allows for the installation of a program on multiple computers within a network. This means that multiple users can access and use the program simultaneously from different computers connected to the same network. It provides flexibility and cost-effectiveness for organizations that require multiple users to access the software.
15.
....................means a representation of information, knowledge, facts, concepts or instructions.
Correct Answer
A. Data
Explanation
Data refers to a representation of information, knowledge, facts, concepts, or instructions. It can be in the form of numbers, text, images, or any other format that can be processed and analyzed by a computer or human. Data is crucial for making informed decisions and understanding various phenomena. It serves as the foundation for generating insights and extracting meaningful information.
16.
..............means the official Gazette published in the eletronic form.
Correct Answer
A. Eletronic Gazette
Explanation
The term "eletronic Gazette" refers to the official Gazette that is published in electronic form. This means that instead of being published in print or physical format, the Gazette is made available digitally. Therefore, the answer "eletronic Gazette" accurately describes the official publication in electronic form.
17.
...................key means the key of a key pair used to create a digital signature.
Correct Answer
A. Private
Explanation
The correct answer is "private". In the context of creating a digital signature, a key pair is used, consisting of a private key and a public key. The private key is kept secret and is used to generate the digital signature, while the public key is shared with others to verify the authenticity of the signature. Therefore, the private key is the key of the key pair used to create a digital signature.
18.
The legal and regulatory ascepts of intemet refers to.....................
Correct Answer
A. Cyber law
Explanation
The correct answer is cyber law. The legal and regulatory aspects of the internet pertain to the laws and regulations that govern online activities and behavior. Cyber law encompasses a wide range of legal issues related to the internet, such as online privacy, intellectual property rights, electronic transactions, and cybercrime. It establishes guidelines and regulations to ensure that individuals and organizations operate within the legal framework while using the internet.
19.
Cyber Law is contained in..............
Correct Answer
A. IT act, 2000
Explanation
The correct answer is IT act, 2000. The IT act, 2000 is a law in India that deals with various aspects of cybercrime, electronic commerce, and electronic governance. It provides legal recognition for electronic transactions, digital signatures, and electronic records. The act also defines various cyber offenses and their penalties. Therefore, cyber law is contained in the IT act, 2000.
20.
..........include data, text, image, sound, voice, codes, computer programs, software and database.
Correct Answer
B. Information
Explanation
The given answer "information" is correct because it encompasses all the mentioned elements such as data, text, image, sound, voice, codes, computer programs, software, and database. Information refers to processed or organized data that has meaning and can be used for decision-making or understanding. It is a broader term that includes various forms of data and content.
21.
To maintain confidentiality of data and to promote integration of data is called as..........
Correct Answer
B. Privacy
Explanation
Privacy refers to the protection of personal information and the right to control how it is collected, used, and shared. It ensures that sensitive data is kept confidential and not accessed by unauthorized individuals. Privacy also promotes the integration of data by establishing trust and confidence among individuals and organizations, encouraging them to share information without fear of misuse or breach.
22.
Copyright is...............
Correct Answer
A. An intelectual property right attached to original works in which the right subsist with him.
Explanation
Copyright is an intellectual property right attached to original works, such as books, music, and artwork. This right allows the creator of the work to have exclusive control over its use and distribution. It protects the creator from unauthorized copying, distributing, or performing their work without their permission. The right subsists with the creator, meaning that they have the sole authority to decide how their work is used and who can benefit from it.
23.
.....................Software allows for anyone to use, copy and distribute it with modifications free of cost.
Correct Answer
A. Freeware
Explanation
Freeware refers to software that is available for anyone to use, copy, and distribute with modifications, without any cost. This means that the software is free to download and use, and users have the freedom to modify and distribute it as they wish. Unlike shareware, which often has limitations or requires payment for full functionality, freeware is completely free of charge. Public domain refers to works that are not protected by copyright and are available for public use, but it does not necessarily imply that modifications are allowed. Non-freeware refers to software that is not free and requires payment to use.
24.
Software available onInternet are.......
Correct Answer
C. Public domain
Explanation
Public domain refers to software that is not protected by copyright and is freely available for anyone to use, modify, and distribute. This means that the software can be accessed and used by anyone without any restrictions or limitations. Unlike freeware and shareware, public domain software does not require any payment or licensing fees. Therefore, the correct answer is public domain.
25.
...........is a distribution method to judge the software whether it is good or bad before you pay for it.
Correct Answer
B. Freeware
Explanation
Freeware refers to software that is available for use at no cost. It allows users to judge the software's quality and functionality before making any payment. This distribution method is commonly used to provide software for personal use, allowing individuals to try out the software and decide if they want to continue using it without any financial commitment.
26.
.................... is a discipline that deals with issues in copyright, trademark and patent laws.
Correct Answer
D. Intellectual Property Right
Explanation
Intellectual Property Right is the correct answer because it is a discipline that specifically deals with issues related to copyright, trademark, and patent laws. Intellectual property refers to creations of the mind, such as inventions, literary and artistic works, symbols, names, and designs, which are protected by laws. This discipline focuses on protecting and enforcing these rights, ensuring that individuals and businesses have legal ownership and control over their intellectual creations.
27.
...................laws grant the creator the exclusive rights to reproduce, perform,distribute and display the work publicly.
Correct Answer
A. Copyright
Explanation
Copyright laws grant the creator the exclusive rights to reproduce, perform, distribute, and display their work publicly. These laws protect the original expression of ideas and prevent others from using or copying the work without permission. Copyright is a legal concept that provides creators with the ability to control and profit from their creations, encouraging innovation and creativity. It ensures that creators have the right to determine how their work is used and prevents unauthorized use or exploitation of their intellectual property.
28.
.............gives the protection to original work.
Correct Answer
D. Copyright
Explanation
Copyright gives protection to original work by granting the creator exclusive rights to reproduce, distribute, display, and perform their work. It allows the creator to control how their work is used and prevents others from using or copying it without permission. This protection encourages creativity and innovation by providing legal rights and incentives to creators, ensuring that they can benefit from their creations and have control over their intellectual property.
29.
...............is a leagal use of copyrighted material without explicit permission from the copyrighted holder.
Correct Answer
D. Fairuse
Explanation
Fair use is a legal principle that allows limited use of copyrighted material without the need for explicit permission from the copyright holder. It allows for the use of copyrighted material for purposes such as criticism, comment, news reporting, teaching, scholarship, or research. Fair use is an exception to copyright law and is intended to balance the rights of the copyright holder with the public's interest in accessing and using copyrighted works.
30.
Ethics in business ultivate strong..........
Correct Answer(s)
A. Productivity
D. Teamwork
Explanation
Ethics in business cultivate strong productivity and teamwork. When a company operates with ethical principles, employees are more likely to feel valued and motivated, leading to increased productivity. Ethical behavior also fosters a positive work environment, encouraging teamwork and collaboration among employees. By prioritizing ethics, businesses can create a culture that promotes both individual and collective success, ultimately driving productivity and fostering effective teamwork.
31.
Step to step software piracy.............
Correct Answer(s)
A. Installation Licensed software
B. Purchased software without license
Explanation
The given correct answer suggests that the step-by-step process of software piracy involves first installing licensed software, then purchasing software without a license, and finally installing pirated software. This implies that individuals initially start by using legitimate licensed software, but then choose to acquire software without obtaining the necessary licenses, leading to the installation of pirated versions.