Anda di halaman 1dari 14

Model Question Paper Subject Code: MT0044 Subject Name: IT Law and Practice Credits: 2 Marks: 70

Part A (One mark questions)

1. The imaginary location where the word of the parties meets in conversation is referred to as ________________. A. cyberspace B. space C. cyberdyne D. cybernet

2. E-commerce is the commercial transaction of services in a/an ______________ A. mechanical format. B. electronic format C. paper D. stone

3. The Worlds first computer-specific statute was enacted in 1970, by the German state, in the form of a ___________________ . A. Data Protection Act.

B. Cyber Law C. Copy right D. Patent right.

4. E-commerce is the commercial transaction of services in a/an ______________ A. mechanical format. B. electronic format C. paper D. stone

5. Which of the following refers to a business platform, involving a business entity and consumers? A. Business-to-consumer (B2C) B. Business-to-business (B2B) C. Consumer-to-business (C2B) D. Consumer-to-consumer (C2C)

6. Which of the following is issued online for use over the Internet and is stored in an electronic device such as a chip card or computer memory? A. hard cash B. business card C. E-Cash D. E- card

7. With a view to facilitate ___________________, it is proposed to provide for the use and acceptance of electronic records and digital signatures in the Govt. Offices and its agencies. A. Electronic Governance B. Paper Governance. C. Oral Testimony. D. mechanical governance.

8. Data, record or data generated image or sound stored, received or sent in an electronic form or micro film or computer generated micro fiche as per the [Sec., 2(t) of I.T. Act, 2000] means ______________________ A. Electronic document. B. Electronic Record C. hard Record D. hard document.

9. ____________________ is a generic term which refers to all the legal and regulator aspects of Internet and the World Wide Web A. Cyber law B. Cyber dyne C. Cyber caf D. electronic law

10. The _________________ provides for authentication of a document by means of digital signatures under Article 7. A. e-commerce B. Model Law

C. e-law D. dynamic law.

11. According the IT act 2000, _______________ means a person who is intended by the originator to receive the electronic record but does not include any intermediary. A. address B.affixing digital signature C. computer resource D. "data"

12. _________________________ is a process of authentication of an electronic record A. Digital Signature Certificate B. Digital key C. Analog signature D. key certificate

13. A challenge relating to Cyber-crimes is the collection of _______________________ A. electronic evidence. B. paper evidence. C. mechanical evidence. D.hardware evidence.

14. As per the sedtion Section 65 to 78 of the IT Act, 2000, ________________________ means the listing of programmes, computer commands, design and layout and programme analysis of computer resource in any form. A. code

B. computer source code C. computer programme D. "commands"

15. __________________________ is that area of law which concerns legal rights associated with creative effort or commercial reputation and goodwill. A. Intellectual property B. Cyber Crime C. copy right D. patent right.

16. In the Irish case of News Datacom Ltd v Satellite Decoding Systems it was accepted that a _________________ decoder for use with scrambled satellite television broadcasts was a computer program. A. Id Card B. smartcard C. RadioActive Card D. ATM card

17. Which of the following act states the types of trademarks that may be registered? A. The Trade and Merchandise Marks Act B. The Trade Marks Act C.The Merchandise Marks Act D. Copyright act

18. Under the Code of Civil Procedure, the effect of foreign judgments has been spelled out under the provisions of ___________. A. s 10 B. s 11 C. s 12 D. s 13

19. According to Article 3 of model law on electronic commerce, which of the following terms means a system for generating, sending, receiving, storing or otherwise processing data messages ?. A. Data message B. Electronic data interchange (EDI) C. Originator D. Information system

20. Transactions in international trade are carried out by means of electronic data interchange and other means of communication, commonly referred to as _______________________. A. electronic commerce B. E2E C. B2B D. Commerce

Part B (Two mark questions)

21. State True (T) or False (F) . (i) For every country, postal and telecommunications networks have long provided an infrastructure of the transmission of information. (ii) Satellite broadcasting does not respect national boundaries, whilst cellular telephones offer the potential for a worldwide network. A. i-T, ii-T B. i-T, ii-F C. i-F, ii-T D. i-F, ii-F

22. State True (T) or False (F). (i) The TCP/IP protocols were developed in the 1970s. (ii) The novel element in the vision of a super-highway is that there should be the capability for the two-way delivery of text, pictures, sound and video. A. i-T, ii-T B. i-T, ii-F C. i-F, ii-T D. i-F, ii-F

23. When a single secret key is used to maintain communication between the sender and the receivers for encryption and decryption purposes, it is referred to as ________________________ system. A. symmetric cryptography or private-key cryptographic B. symmetric cryptography or non - private-key cryptographic C. non-symmetric cryptography or private-key cryptographic D. non-symmetric cryptography or non- private-key cryptographic

24. When different keys are used for encryption and decryption purposes to maintain communication between the sender and the receivers, it is referred to as ________________________ system. A. symmetric cryptography or public-key cryptographic. B. asymmetric cryptography or public-key cryptographic. C. asymmetric cryptography or non-public-key cryptographic. D. symmetric cryptography or non-public-key cryptographic.

25. As per the Indian Evidence Act, 1872 as amended by the Information Technology Act, 2000 which of the given statements are true ? i. A fact is said to be not proved when it is neither proved nor disproved. ii. India means the territory of India excluding the State of Jammu and Kashmir. A. i-True, ii-False B. i-True, ii-True C. i-False, ii-True D. i-False, ii-False

26. The Model Law provides for authentication of a document by means of ____________________ under _______________. A. digital signatures, Article 7 B. written signatures, Article 8 C. digital signatures, Article 8 D. written signatures, Article 7

27. As per IT act 2000, ________________ defines the words security procedure to mean the security procedure prescribed under ________________ by the Central Government. A. Section 2(1), Section 16

B. sectuib 2(2), section 15 C.Section 2(3), Section 17 D. Section 1(2), Section 16

28. State True(T) or False (F) for the given statements. (i) Cyber crime refers to all the activities done with criminal intent in cyberspace or using the medium of Internet. (ii) Cyber stalkiing is not a cyber crime. A. i-T, ii-F B. i-T, ii- T C. i-F, ii- T D. i-F, ii- F

29. State True (T) or False (F) for the given statements. (1) Literal copying occurs where a person copies an existing program existing program by disk to disk copying (2) Literal copying is relatively easy to test for infringement. A. Only 1 is true. B. Only 2 is true. C. Both 1 and 2 are True. D. Both 1 and 2 are False.

30. An Internet contract, is typically a contract that is entered into through the medium of the Internet either by using one of the various constructs of the ___________________________ or _______________________ stating offer and acceptance of the terms and conditions of a particular transaction. A. World Wide Web , through the exchange of email.

B. World Wide Web , through the exchange of fax document. C. intranet , through the exchange of email. D. intranet , through the exchange of fax document.

31. What do the Article 13 and Article 14 of model law on electronic commerce talk about? A. Article 13 talks about Formation and validity of contracts, Article 14 talks about Regulation by parties of data messages. B. Article 13 talks about Regulation by parties of data messages , Article 14 talks about Formation and validity of contracts. C. Article 11 talks about Attribution of data messages , Article 12 talks about Acknowledgement of receipt. D. Article 11 talks about Acknowledgement of receipt., Article 12 talks about Attribution of data messages.

Part C (Four mark questions)

32. Which of the following combination/match is True? 1. Cyberspace -- 1969 2. Artificial satellite -- Sputnik 3. First law on computers --Data Protection Act 4. ARPHANET ----- William Gibson,

A. 1-T, 2-T, 3-T, 4-T B. 1-F, 2-T, 3-T, 4- F C. 1-T, 2-F, 3-F, 4-T

D. 1-F,2-F, 3-T, 4-T

33. The six main instruments of e-commerce that have been recognized by WTO are : A. telephone, fax, TV, electronic payment and money transfer systems, EDI (electronic data interchange) and the Internet. B. telephone, fax, Paper, electronic payment and money transfer systems, EDI (electronic data interchange) and the Internet. C. metal, fax, TV, electronic payment and money transfer systems, EDI (electronic data interchange) and the Internet. D. stone, fax, TV, electronic payment and money transfer systems, EDI (electronic data interchange) and the Internet.

34. Which of the following statement is/are true? i. A writing is a document. ii. A map or plan is a document; iii. An inscription on a metal plate or stone is a document; iv. A caricature is a document.

A. i-T, ii-T, iii-T, iv-T B. i-T, ii-F, iii-T, iv-F C. i-F, ii-F, iii-T, iv-T D. i-T, ii-T, iii-F, iv-F

35. State True (T) or False (F) for the given statements. (1) Article 5 of the Model Law provides that information shall not be denied legal effect, validity or enforceability solely on the grounds that it is in the form of a data message.

(2) Article 6 of the Model Law provides that where the law requires information to be in writing, the requirement shall be met where data is accessible so as to be useable for subsequent reference. A. Both 1 and 2 are true. B. Only 1 is true. C. Only 2 is true. D. Both 1 and 2 are false.

36. Gaining entry into instructing or communicating with the logical, arithmetical, or memory function resources of a computer, is called as ____________. Person who is authorized to issue a digital signature is called ____________________. Authentication of any electronic record by a subscriber by means of an electronic method is called ____________________. A. Access, Certifying Authority, digital signature. B. browse, deputy commissioner, digital signature. C. surf, thahasildar, digital signature. D. connectivity, certifying authority, e-card.

37. Which of the following are the Cyber crimes ? 1. Cyber crimes against persons. 2. Cyber crimes against property. 3. Cyber crimes against government. 4. Cyber crimes against animal.

A. 1, 2, 3 only B. 2, 3 ,4 only C 1,3,4 only

D. 2, 3 only.

38. A trademark will be infringed in which of the following situations? 1. Where an identical or similar mark is used in respect of goods or services which are identical or similar to those forming the subject of the trade mark and where there is a consequential likelihood of confusion on the part of the public. 2. Where the identical or similar mark is used; where the goods or services are not identical or similar to those forming the subject of the trade mark but where the trade mark has a reputation takes unfair advantage of, or is detrimental to the distinctive character or repute of the trade marks. A. Only 1 B. Only 2 C. Both 1 and 2 D. Neither 1 nor 2.

Answer Keys Part - A Q. Q. No.


1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11.

Part - B

Part - C

Ans. Key
A B A B A C A B A B A

No.
12. 13. 14. 15. 16. 17. 18. 19. 20.

Ans. Key
A A B A B A D C B

Q. No.
21. 22. 23. 24. 25. 26. 27. 28. 29. 30. 31.

Ans. Key
A A A B B A A A C A C

Q. No.
32. 33. 34. 35. 36. 37. 38.

Ans. Key
B A A A A A C

Anda mungkin juga menyukai