Deck 6: Cyber-Crimes, Quotations, Tenders, and Contract Law
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/24
Play
Full screen (f)
Deck 6: Cyber-Crimes, Quotations, Tenders, and Contract Law
1
Under which section of IT Act, stealing any digital asset or information is written a cyber-crime.
A)65
B)65-d
C)67
D)70
A)65
B)65-d
C)67
D)70
65
2
What is the punishment in India for stealing computer documents, assets or any software's source code from any organization, individual, or from any other means?
A)6 months of imprisonment and a fine of rs. 50,000
B)1 year of imprisonment and a fine of rs. 100,000
C)2 years of imprisonment and a fine of rs. 250,000
D)3 years of imprisonment and a fine of rs. 500,000
A)6 months of imprisonment and a fine of rs. 50,000
B)1 year of imprisonment and a fine of rs. 100,000
C)2 years of imprisonment and a fine of rs. 250,000
D)3 years of imprisonment and a fine of rs. 500,000
3 years of imprisonment and a fine of rs. 500,000
3
What is the updated version of the IT Act, 2000?
A)it act, 2007
B)advanced it act, 2007
C)it act, 2008
D)advanced it act, 2008
A)it act, 2007
B)advanced it act, 2007
C)it act, 2008
D)advanced it act, 2008
it act, 2008
4
In which year the Indian IT Act, 2000 got updated?
A)2006
B)2008
C)2010
D)2012
A)2006
B)2008
C)2010
D)2012
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
5
What type of cyber-crime, its laws and punishments does section 66 of the Indian IT Act holds?
A)cracking or illegally hack into any system
B)putting antivirus into the victim
C)stealing data
D)stealing hardware components
A)cracking or illegally hack into any system
B)putting antivirus into the victim
C)stealing data
D)stealing hardware components
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
6
Quotations are letters of enquiry.
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
7
Where is the name of the company inviting mentioned in an invitation of quotation?
A)top left corner
B)bottom left corner
C)top right corner
D)bottom right corner
A)top left corner
B)bottom left corner
C)top right corner
D)bottom right corner
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
8
Where is the name of the company which is invited mentioned?
A)top left corner
B)top right corner
C)bottom left corner
D)bottom right corner
A)top left corner
B)top right corner
C)bottom left corner
D)bottom right corner
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
9
Where is the courteous leave-taking mentioned in an invitation of quotation?
A)top left
B)bottom right
C)top right
D)bottom left
A)top left
B)bottom right
C)top right
D)bottom left
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
10
Quotations are friendly letters.
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
11
A tender is advertised in___________
A)newspapers
B)business environment
C)domestic markets
D)sellers
A)newspapers
B)business environment
C)domestic markets
D)sellers
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
12
Where is the designation of the authority giving the tender mentioned?
A)top center
B)bottom left
C)bottom right
D)top left
A)top center
B)bottom left
C)bottom right
D)top left
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
13
Where is the name of the organization mentioned in the tender?
A)top left
B)top center
C)top right
D)bottom center
A)top left
B)top center
C)top right
D)bottom center
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
14
Which of these is mentioned in a tender?
A)notice number
B)signature
C)address of the tenderer
D)courteous leave-taking
A)notice number
B)signature
C)address of the tenderer
D)courteous leave-taking
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
15
The core of reverse engineering is an activity called
A)restructure code
B)directionality
C)extract abstractions
D)interactivity
A)restructure code
B)directionality
C)extract abstractions
D)interactivity
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
16
Forward engineering is also known as
A)extract abstractions
B)renovation
C)reclamation
D)both renovation and reclamation
A)extract abstractions
B)renovation
C)reclamation
D)both renovation and reclamation
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
17
Reverse engineering techniques for internal program data focus on the definition of classes of objects.
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
18
Which of the following steps may not be used to define the existing data model as a precursor to re-engineering a new database model:
A)build an initial object model
B)determine candidate keys
C)refine the tentative classes
D)discover user interfaces
A)build an initial object model
B)determine candidate keys
C)refine the tentative classes
D)discover user interfaces
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
19
Reverse engineering and Re-engineering are equivalent processes of software engineering.
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
20
Which of the following is not an objective of reverse engineering?
A)to reduce maintenance effort
B)to cope with complexity
C)to avoid side effects
D)to assist migration to a case environment
A)to reduce maintenance effort
B)to cope with complexity
C)to avoid side effects
D)to assist migration to a case environment
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
21
A voluntary arrangement between two or more parties that is enforceable by law as a binding legal agreement is known as
A)job
B)loan
C)contract
D)mutual fund
A)job
B)loan
C)contract
D)mutual fund
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
22
What is the type of mistake which occurs when only one party to a contract is mistaken as to the terms or subject-matter?
A)mutual mistake
B)unilateral mistake
C)bilateral mistake
D)individual mistake
A)mutual mistake
B)unilateral mistake
C)bilateral mistake
D)individual mistake
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
23
How are final contracts signed in modern business?
A)e-signatures
B)document scanning
C)thump impression
D)shaking hands
A)e-signatures
B)document scanning
C)thump impression
D)shaking hands
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
24
Which tender allows anyone to submit a tender to supply the goods or services that are required?
A)framework tendering
B)selective tendering
C)open tendering
D)close tendering
A)framework tendering
B)selective tendering
C)open tendering
D)close tendering
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck

