Questions and Answers: IT & Cyber Law
Hi,friends today we can study some important information about IT and cyber law ,which are very useful in any competitive exams like SSC,UPSC,PSC,RRB etc.Computer Awareness is becoming most common part of today's competitive examinations1. Which spreadsheet software is most suitable for preparing balance sheet?
A. MS office
B. MS Excel
C. Application software
D. Tally accounting
Ans : B. MS Excel
2. The most popular way to materialize XML document is to use?
A. DTD
B. XSLT
C. HTML
D. SOAP
Ans : B. XSLT
3. ................. is an example of application software.
A. Windows
B. Linux
C. MS Excel
D. DOS
Ans : C. MS Excel
4. The short cut used for inserting line break.
A. Shift+enter
B. Ctrl+enter
C. Ctrl+K
D. Alt+enter
Ans : A. Shift+enter
5. To create a multiplication table in excel ............... command is used.
A. Consolidate
B. Table
C. Name
D. Function
Ans : D. Function
6. Total number of character cases available in word is .....................
A. 4
B. 7
C. 5
D. 6
Ans : C. 5
7. ..................... unit provides the communication from man to machine.
A. Input unit
B. Memory unit
C. ALU
D. Control unit
Ans : A. Input unit
8. To change the size and style of first letter of a selected paragraph ................ is used.
A. Change case
B. Drop cap
C. Replace
D. Auto correct
Ans : B. Drop cap
9. ....................... helps to save a document in another name.
A. Save As
B. Save
C. Edit
D. Open
Ans : A. Save As
10. The option of minimize,maximize and close are located in .................
A. Menu bar
B. Status bar
C. Title bar
D. Task bar
Ans : C. Title bar
11. View show command is present on ................. menu.
A. Edit
B. Tools
C. Insert
D. Slide show
Ans : D. Slide show
12. ARPANET is an example of:
A. LAN
B. RAN
C. MAN
D. WAN
Ans : D. WAN
13. A person who spends large amounts of leisure time to operating a computer:
A. Mouse Tomato
B. Mouse slept
C. Mouse Potato
D. Computerologist
Ans : C. Mouse Potato
14. What is the use of book marks in Microsoft world ?
A. To quickly jump to the ending of the document.
B. To create a link within the document.
C. To easily the spelling errors.
D. To quickly jump to specific location in the document.
Ans : D. To quickly jump to specific location in the document.
15. If you move the mouse pointer over an icon,you find information about this icon in a small rectangle box.This information is called:
A. Screen saver
B. Wall paper
C. Background
D. Tool tip
Ans : D. Tool tip
16. Which was the first antivirus software?
A. Creeper
B. Norton
C. Mc A fee
D. Reaper
Ans : D. Reaper
17. The most widely used computer word processing system is .............
A. Word Pad
B. Ms-Word
C. Ms-Excel
D. Ms-Powerpoint
Ans : B. Ms-Word
18. ..................... is a secret word that resticts unauthorized people from using a program or computer.
A. Catchword
B. Safeguard
C. Username
D. Password
Ans : D. Password
19. The mother tongue of a computer is ......................
A. BASIC language
B. FORTRAN
C. Machine language
D. Assembly language
Ans : C. Machine language
20. The text which appears at the top of a page is known as :
A. The header
B. The paging
C. The footer
D. None of the above
Ans : A. The header
21. Page orientation can be:
A. Parellel
B. Landscape or Portrait
C. Fixed
D. Flexible
Ans : B. Landscape or Portrait
22. Which shortcut key is used for underlines words but not spaces?
A. Ctrl+Shift+W
B. Ctrl+Shift+U
C. Alt+Shift+W
D. Alt+Shift+U
Ans : A. Ctrl+Shift+W
23. The shortcut key for closing a document in MS-Word.
A. Ctrl+W
B. Alt+W
C. Shift+W
D. Alt+Enter+W
Ans : A. Ctrl+W
24. The latest version of MS-Office is ................
A. Ms-Office 2003
B. Ms-Office 2010
C. Ms-Office 2012
D. Ms-Office 2016
Ans : D. Ms-Office 2016
25. Key board shortcut to start next page at the current cursor position.
A. Shift+Enter
B. Alt+Enter
C. Ctrl+Enter
D. Shift+Alt+Enter
Ans : C. Ctrl+Enter
26. RAD stands for ?
A. Repeated application development
B. Ready application development
C. Relative applicat
D. Rapid application development
Ans : D. Rapid application development
27. To move cursor to end of the document,press
A. End
B. Ctrl+end
C. Alt+end
D. Shift+end
Ans : B. Ctrl+end
28. Expansion of CPU is ................
A. Central peripheral unit
B. Central printing unit
C. Central processing unit
D. None of the above
Ans : C. Central processing unit
29. The following is an example of software
A. Central processing unit
B. MS office
C. Key board
D. Mouse
Ans : B. MS office
30. What does MODEM stand for ?
A. Modulation-Demodulation
B. Modulator-Demodulator
C. Modulate-Demodulate
D. None of these
Ans : B. Modulator-Demodulator
31. In a computer,most process takes place in
A. RAM
B. Hard disk
C. Motherboard
D. CPU
Ans : D. CPU
32. Identify the odd one
A. Compiler
B. Assembler
C. Operating system
D. Interpreter
Ans : C. Operating system
33. The short key for removes italic format for select text is:
A. Ctrl+B
B. Ctrl+I
C. Ctrl+U
D. Ctrl+A
Ans : B. Ctrl+I
34. What is a firewall ?
A. Boundary of a network
B. A routing software
C. Software to prevent unauthorized access
D. A web browsing software
Ans : C. Software to prevent unauthorized access
35. Which of the following is not a term pertaining to the internet?
A. Link
B. Browser
C. Search engine
D. Keyboard
Ans : D. Keyboard
36. Which of the technology is mostly used in banking industry?
A. Bar code Reader
B. OCR
C. OMR
D. MICR
Ans : D. MICR
37. What is the address given to a computer connected to a network called?
A. Internet service providers address
B. IP address
C. Users personal address
D. URL
Ans : B. IP address
38. The father of super computer:
A. Charles Babbage
B. Glen Ricort
C. Seymor Cray
D. Winton surf
Ans : C. Seymor Cray
39. ...................... software acts as an interface between user and internet.
A. Operating system
B. Yahoo
C. Browser
D. NIC
Ans : C. Browser
40. The process of transferring files from a computer on the internet to your computer is called:
A. Downloading
B. Uploading
C. Downsize
D. JPEG
Ans : A. Downloading
Cyber laws
- Information technology act 2000 is the primary law in India dealing with electronic commerce and cyber crime.It is based on the united nations model law on electronic commerce 1996 adopted by united nations commission on international trade law.This law was later recommended by UN general Assembly through resolution (on 30th January 1997).
- IT act 2000 is an act to provide legal recognition for transactions carried out by means of electronic data interchange and other means of electronic communication(e-commerce).It facilitates e-filing of documents with government agencies.It act 2000 received the assent of president of India on June 9,2000 and came in to effect on October 17,2000.
- Indian penal code,Indian evidence act (1872),Banker's books evidence act (1891) abd RBI act (1934) were amended as part of IT act 2000. Original act contained 94 sections,13 chapters and 4 schedules.
- IT (amendment) act 2008 received the assent of president of India on February 5 , 2009 and came in to effect on October 27, 2009. IT act applies to the whole of India.As per section 75,It is applicable to any offence or contravention committed outside India too.Negotiable instrument,Power of attorney,trust,sale of an immovable property etc. are excluded to IT act.
- Digital signature was defined in IT act 2000 and was later replaced by the term electronic signature in It amendment act 2008.As per section 46,IT act permits to appoint adjudicator who will handle all civil cases related to the act.
- If a person without permission of the owner or in charge of a computer accesses the system or downloads or damages or disrupts or infects the system the intruder is liable to pay damages in the form of compensation up to 1 crore rupees under section 43 of IT act 2000.Upper cap of compensation was later removed by IT amendment act 2008.
- As per IT amendment act 2008, body corporate not taking due care and not putting reasonable security practices and procedures in place while handling sensitive personal data or information are liable to pay damages.
- Section 66 of IT act is the criminal offence of civil offences mentioned in section 43.The term 'hacking' which was mentioned in IT act 2000 (section 66) was removed later in IT amendment act 2008.
- Section 66 B to 66 F of IT amendment act deals with theft of computer resource.Identity theft,cheating by personation and cyber terrorism.Section 67 deals with punishment for publishing or transmitting obscene material in electronic form.
- Section 70 B of IT amendment act 208 stipulates the formation of computer emergency response team (CERT-In).Section 70 A deals with the formation of critical information infrastructure protection agency.CERT-In will serve as the national agency for incident response.It will collect,analyze and disseminate information on cyber incidents and will coordinate cyber incident response activities.
- As per IT act 2000,a police officer not below the rank of deputy superintendent shall investigate any offence under the act(section 78).It was amended as inspector of police in It amendment act 2008.
Cyber GK
1. Ethical computer hackers are called as ....................
Answer : White Hat Hackers
2. Hackers who breaks security of a system for non malicious reason like testing their own system are called ..................
Answer : White Hat Hackers
3. Hackers who break security of a system for malicious intent are called ...............
Answer : Black Hat Hackers
4. Hackers who intrude for the sole purpose of notifying the administrator about a security defect in the system are called....................
Answer : Grey Hat Hacker
5. Hacking is an offence as per IT Act 2000 section ....................
Answer : 66
6. ................ is someone outside computer security consulting firms who is used to bug-test a system prior to its launch,looking for exploits so they can be closed.
Answer : Blue Hat Hacker
7. A person who does hacking in an unskilled manner or in a childish way is called .............
Answer : script Kiddie
Cyber Law in India
1. Tampering with computer source Documents - Sec.65
2. Hacking with computer systems , Data Alteration - Sec.66
3. Sending offensive messages through communication service, etc - Sec.66A
4. Dishonestly receiving stolen computer resource or communication device - Sec.66B
5. Identity theft - Sec.66C
6. Cheating by personation by using computer resource - Sec.66D
7. Violation of privacy - Sec.66E
8. Cyber terrorism - Sec.66F
9. Publishing or transmitting obscene material in electronic form - Sec .67
10. Publishing or transmitting of material containing sexually explicit act,etc. in electronic form -Sec.67A
11. Punishment for publishing or transmitting of material depicting children in sexually explicit act, etc. in electronic form - Sec.67B
12. Preservation and Retention of information by intermediaries - Sec.67C
13. Powers to issue directions for interception or monitoring or decryption of any information through any computer resource - Sec.69
14. Power to issue directions for blocking for public access of any information through any computer resource - Sec.69A
15. Power to authorize to monitor and collect traffic data or information through any computer resource for Cyber Security - Sec.69B
16. Un-authorized access to protected system - Sec.70
17. Penalty for misrepresentation - Sec.71
18. Breach of confidentiality and privacy - Sec.72
19. Publishing False digital signature certificates - Sec.73
20. Publication for fraudulent purpose - Sec.74
21. Act to apply for offence or contraventions committed outside India - Sec.75
22. Compensation, penalties or confiscation not to interfere with other punishment - Sec.77
23. Compounding of Offences - Sec.77A
24. Offences with three years imprisonment to be cognizable - Sec.77B
25. Exemption from liability of intermediary in certain cases - Sec.79
Basic Computer Knowledge 500 + Questions and Answers https://www.a2zgkinfo.com/2018/07/basic-computer-knowledge-500-questions-answers.html
Basic Computer GK questions and answers:2018 https://www.a2zgkinfo.com/2018/02/computer-gk-questionsandanswers.html
Degree Level Psc Questions and Answers: IT & Cyber Law |
0 comments:
Post a Comment
Thank you, visit again