Question 1 :
The digital data trail we leave online intentionally is called _____
Question 2 :
Which of the following activity is an example of leaving Active digital footprints?
Question 4 :
Our digital footprints are stored in local web browser in the form of ________
Question 7 :
Anyone who uses digital technology along with Internet is a ____
Question 11 :
Online posting of rumours, giving threats online, posting the victim’s personal information, comments aimed to publicly ridicule a victim is termed as __________
Question 12 :
_______ is a person who deliberately sows discord on the Internet by starting quarrels or upsetting people, by posting inflammatory or off topic messages in an online community.
Question 13 :
Which of the following is not an example of Social media platform?
Question 14 :
________ are websites or applications that enable users to participate by creating and sharing content with others in the community.
Question 16 :
Data that can cause substantial harm, embarrassment, inconvenience and unfairness to an individual, if breached or compromised, is called _______________
Question 21 :
The name and logo of the software will be protected by ___________
Question 23 :
The ____________ include right to copy (reproduce) a work, right to distribute copies of the work to the public, and right to publicly display or perform the work.
Question 24 :
A ______________ provide an exclusive right to prevent others from using, selling, or distributing the protected invention
Question 25 :
A patent protects an invention for ___________ years, after which it can be freely used.
Question 26 :
Patentee has the full right of using, selling, or distributing the protected invention.(T/F)
Question 27 :
_____________ includes any visual symbol, word, name, design, slogan, label, etc., that distinguishes the brand from other brands.
Question 29 :
_________________covers all clauses of software purchase, viz., how many copies can be installed, whether source is available, whether it can be modified and redistributed and so on.
Question 30 :
___________ means using other’s work and not giving adequate citation for use.
Question 32 :
A ____________ is a type of contract between the creator of an original work permitting someone to use their work, generally for some price.
Question 33 :
Presenting someone else’s idea or work as one’s own idea or work is called ________
Question 34 :
Ravi copy some contents from Internet, but do not mention the source or the original creator. This is an act of ______
Question 35 :
_____________ means unauthorized use of other’s trademark on products and services.
Question 39 :
GPL is primarily designed for providing public license to a ______
Question 48 :
Ravi downloaded a software from internet (free of cost) and moreover the source code of the software is also available which can be modified. What category of software is this?
Question 49 :
____________ is a branch of science that deals with designing or arranging workplaces including the furniture, equipment and systems so that it becomes safe and comfortable for the user.
Question 50 :
After practical, Atharv left the computer laboratory but forgot to sign off from his email account. Later, his classmate Revaan started using the same computer. He is now logged in as Atharv. He sends inflammatory email messages to few of his classmates using Atharv’s email account. Revaan’s activity is an example of which of the following cyber crime?