Friday, June 23, 2017

MSQ - CYBER LAW - SEE 2074 [COMPUTER SCIENCE]



1.      A genetic term that is concerned to the legal and regulatory aspects of Internet and computer technology.
Copyright law                            Cyber law                           Computer Crime None of them
2.      A criminal activity within the information technology infrastructure.
Digital crime                              Intellectual property         Cybercrime                        All of them
3.      Cyber law of Nepal of Nepal was enacted in Nepal in ________BS.
2064                             2061                                    2062                                    2063
4.      A criminal activity within the information technology infrastructure.
Digital crime               Intellectual property         Cybercrime                        All of them
5.      _______ is the normal Principal that regulates the use of computers.
Cyber Law                  Cyber act                            Computer ethics All of them
6.      The method of making the data or message unreadable by unauthorized people.
Digital signature                Decryption          Encryption                         All of them
7.      IRP expands to
i) Individual Property Rights                      ii) Individual Performance Rights
iii) Intellectual Property                              iv) Intellectual Performance Rights
8.      Cyber law of Nepal commonly known as the Electronic Transaction and Digital Signature Act Ordinance was enacted in Nepal in___________________
i) 2061 BS                    ii) 2062BS                         iii) 2063 BS                          iv) 2064 BS
9.      Premeditated, usually politically-motivated violence committed against civilians through the use of, or with the help of, computer technology
i) Cyber stalking             ii) Cyber laundering    iii) Cyber theft              iv) Cyber terrorism
10.   The act of attempting to acquire sensitive information like usernames, passwords and credit card details by disguising as a trust worthy source.
i) Hacking                     ii) Phishing                       iii) Computer Virus              iv) Cyber stalking
11.   Fair Credit Reporting Act is a federal law enacted in ________________ to ensure confidentiality of consumer credit information helped by lenders and credit reporting agencies.
i) 1970                                         ii) 1971                                             iii) 1972                           iv) 1973
12.   IPR expands to
                          i)Individual Property Rights                            ii)Individual Performance Rights
                          iii)Intellectual Property Rights                         iv)Intellectual Performance Rights
13.   Electronic transfer of illegally-obtained monies with the goal of hiding its source and possibly its destination.
                              I)Cyber stalking          ii) Cyber laundering iii) Cyber theft                      iv) Cyber terrorism
14.   The  act of attempting to acquire sensitive information like usernames, passwords, and credit card details by disguising as a trust worth source.
                              i)Hacking                        ii)Phishing                             iii)Computer viruses                 iv)Cyber stalking
15.   Which of the following is computer crime?
i. piracy            ii. pornography                  iii. harassment                iv.All of above
16.   When did cyber law introduced in Nepal.
i.2002 A.D.        ii.2003 A.D.                      iii.2004 A.D.                  iv.2005 A.D.
17.   Which of the following is not computer crime?
i. Plagiarism        ii. Password guessing         iii. Internet                      iv. virus transferring
18.   Which of the following is included in cyber law?
i. Trademark right    ii. Copyright                       iii. Data privacy               iv. All of the above
19.   Which of the following is not computer ethics?
Not to steal data                   Not to bear false message            Not to use Internet        Not to harm the society
20.   The term ‘cyberspace’ was used in:
1984                                 1884                                    1985                                   1885
21.   The law which includes literature and art, films, computer programs, invention, designed used by traders for their goods or services is called:
                                                              i.     Data Privacy Law                                    Intellectual Property Law
                                                             ii.     Telecommunication Law                        Cyber crime Law
22.   The Process of ensuring the preservation, integrity and reliability of data is Known as:
                                                              i.     Intellectual Property Law                       Data Protection and Privacy law
                                                             ii.     Cyber Law                                                Telecommunication Law
23.   “The Electronic Transaction and Digital Signature Act-Ordinance” is Known as:
                                                              i.     Intellectual Property Law                                      Cyber Law
                                                             ii.     Telecommunication Law                                       Data Protection Law
24.   The government of Nepal has passed the cyber law on:
31st Bhadra 2061 BS                 29th Bhadra 2061 BS         30thBhadra 2062 BS          30thBhadra 2061 BS
25.   The law that provides a legal framework to facilitate and safeguard electronic transaction in the electronic medium.
i. Digital signature law     ii. Intellectual property law            ii. Telecommunication law
26.   A criminal activity involving the information technology infrastructure.
i. Digital crime                   ii. intellectual property                   iii. Cyber crime
27.   A federal law enacted in 1970 to ensure confidentiality of consumer credit information held by lenders and credit reporting agencies.
i. Fair credit reporting act                              ii.Federal privacy act                       iii.Copyright act

No comments:

Post a Comment