CA3(Marks 28.75, One Answer is not correct)
Q: 01 of 30
Intellectual Property Rights (IPR) protect the use of information and ideas that are of
a) Ethical value
b) Moral value
c) Social value
d) Commercial value
Answer : D
Q: 02 of 30
The term ‘Intellectual Property Rights’ covers
a) Copyrights
b) Know-how
c) Trade dress
d) All of the above
Answer : D
Q: 03 of 30
The following can not be exploited by assigning or by licensing the rights to others.
a) Patents
b) Designs
c) Trademark
d) All of the above
Answer : C
Q: 04 of 30
The following can be patented
a) Machine
b) Process
c) Composition of matter
d) All of the above
Answer : D
Q: 05 of 30
Trade mark
a) is represented graphically
b) is capable of distinguishing the goods or services of one person from those of others
c) may includes shapes of goods or combination of colours
d) All of the above
Answer : D
Q: 06 of 30
Symbol of Maharaja of Air India is
a) Copyright
b) Patent
c) Trademark
d) All of the above
Answer : C
Q: 07 of 30
Design does not include
a) features of shape
b) composition of lines or colours
c) mode or principle of construction
d) None of the above
Answer : C
Q: 08 of 30
Which of the following is (are) included in Geographical indications of Goods
a) Handicraft
b) Foodstuff
c) Manufactured
d)All of the above
Answer : D
Q: 09 of 30
Geographical Indication is
a) Private right
b) Community right
c) Intellectual property right
d) both (b) and (c)
Answer : D
Q: 10 of 30
Certification mark indicates
a) Source
b) Quality
c) (c ) both (a) and (b)
d) None of the above
Answer : B
Q: 11 of 30
Hall Mark is
a) Trademark
b) Certification Mark
c) (c ) Collective Mark
(d) Both (a) and (b)
Options :B
Q: 12 of 30
Patent is a form of
a) Tangible Property
b) Intellectual Property
c) Industrial property
(d) Both (b) and (c)
Answer : D
Q: 13 of 30
Patent right is
a) Exclusive right
b) Natural right
c) Property right
d) Both (a) and (c )
Answer : A
Q: 14 of 30
Patentability criteria includes
a) Novelty
b) Inventive step
c) Capable of Industrial application
(d) All the above
Answer : D
Q: 15 of 30
What protects the intellectual property created by artists?
a) copyright
b) geographical indications
c) patents
d) registered designs
Answer : A
Q: 16 of 30
What protects the intellectual property created by designers?
a) copyright
b) geographical indications
c) patents
d) registered designs
Answer : D
Q: 17 of 30
How long do patents usually last for?
a) 10 years
b) 20 years
c) 40 years
d) 60 years
Answer : B
Q: 18 of 30
If a company develops a new technology that improves its main product, what type of
intellectual property can they use to stop others from copying their invention?
a) copyright
b) geographical indications
c) patents
d) registered designs
Answer : C
Q: 19 of 30
Which of the following is not a type of peer-to-peer cyber-crime?
a) Phishing
b) Injecting Trojans to a target victim
c) MiTM
d) Credit card details leak in deep web
Answer : D
Q: 20 of 30
Which of the following is not done by cyber criminals?
a) Unauthorized account access
b) Mass attack using Trojans as botnets
c) Email spoofing and spamming
d) Report vulnerability in any system
Answer : D
Q: 21 of 30
In which year India’s IT Act came into existence?
a) 2000
b) 2001
c) 2002
d) 2003
Answer : A
Q: 22 of 30
The method of making the data or message unreadable by unauthorized people.
a) Digital signature
b) Decryption
c) Encryption
d) All of them
Answer : C
Q: 23 of 30
Premeditated, usually politically-motivated violence committed against civilians through the use
of, or with the help of, computer technology
a) Cyber stalking
b) Cyber laundering
c) Cyber theft
d) Cyber terrorism
Answer : D
Q: 24 of 30
Which of the following is computer crime?
a) Plagarisim
b) pornography
c) IPR
d) All of above
Answer : C
Q: 25 of 30
The Process of ensuring the preservation, integrity and reliability of data is Known as:
a) Intellectual Property Law
b) Data Protection and Privacy law
c) Cyber Law
d) Telecommunication Law
Answer : B (Not Sure)
Q: 26 of 30
Which of the following is not computer ethics?
a) Not to steal data
b) Not to bear false message
c) Not to use Internet
d) Not to harm the society
Answer : C
Q: 27 of 30
Electronic transfer of illegally-obtained monies with the goal of hiding its source and
possibly its destination.
a) Cyber stalking
b) Cyber laundering
c) Cyber theft
d) Cyber terrorism
Answer : B
Q: 28 of 30
Which of the following is not done by cyber criminals?
a) Unauthorized account access
b) Mass attack using Trojans as botnets
c) Email spoofing and spamming
d) Report vulnerability in any system
Answer : D
Q: 29 of 30
What type of cyber-crime, its laws and punishments does section 66 of the Indian IT Act
holds?
a) Cracking or illegally hack into any system
b) Putting antivirus into the victim
c) Stealing data
d) Stealing hardware components
Answer : A
Q: 30 of 30
What is the punishment in India for stealing computer documents, assets or any software’s
source code from any organization, individual, or from any other means?
a) 6 months of imprisonment and a fine of Rs. 50,000
b) 1 year of imprisonment and a fine of Rs. 100,000
c) 2 years of imprisonment and a fine of Rs. 250,000
d) 3 years of imprisonment and a fine of Rs. 500,000
Answer : D