Deck 7: Copyright Policies, E-Learning, Cybersecurity, and Cyber Laws

Full screen (f)
exit full mode
Question
The policy of ----------------- has allowed a range of exceptions to the copyright provision.

A)limited use
B)ipr
C)specific use
D)fair use
Use Space or
up arrow
down arrow
to flip the card.
Question
------------------ is based on the belief that the public is entitled to freely use portions of copyrighted materials for certain purpose.

A)limited use
B)ipr
C)specific use
D)fair use
Question
WebCT is :

A)an virtual classroom package
B)a chat group
C)an e-learning tool
D)social network
Question
------------- is the training, which delivers educational content through a web browser over the public or private interest.

A)ics
B)wbt
C)virtual classroom
D)cbt
Question
-------------------- is the where a computer program provides motivation and feedback in place of a live instructor.

A)ics
B)wbt
C)virtual classroom
D)cbt
Question
--------------- is the technology which captivate the student's interest.

A)wbt
B)virtual classroom
C)cbt
D)ict
Question
-------------------- is meant for e-governance applications.

A)brnet
B)inflibnet
C)vast
D)nicnet
Question
Spam means:

A)unwanted e-mail
B)virus
C)software
D)search engine
Question
----------------------- are small text files that some web sites automatically store on your computer hard drive when you visit the site.

A)spam
B)cookies
C)adware
D)malware
Question
Phishing is related to:

A)copy right
B)virus
C)e-learning
D)identity theft
Question
------------------- contain information that is untrue.

A)cookies
B)virus
C)internet hoaxes
D)spam
Question
A ---------------- defined as anyone who breaks into a computer system unlawfully.

A)hacker
B)virus
C)spam
D)internet hoaxes
Question
-------------------- is a computer program that attaches itself to another computer program and attempts to spread it to other computers when files are exchanged.

A)hacker
B)virus
C)trojan horse
D)cookies
Question
What is logic bomb?

A)hacker
B)virus
C)trojan horse
D)cookies
Question
--------------------- slightly different from virus.

A)trojan horses
B)worms
C)logic bombs
D)cookies
Question
A computer user copies an application onto more than one computer, if the license agreement does not permit this, is participating:

A)phishing
B)hacking
C)identity theft
D)software piracy
Question
----------------- is an agreement between the user and the software developer.

A)copy right
B)software license
C)ipr
D)none of these
Question
The Computer Ethics Institute of United States developed:

A)guide lines for fair use
B)free software program
C)anti-virus program
D)ten
Question
------------------------- is treated as the bench mark for ethical computing.

A)copyright law
B)ipr law
C)ten commandments of computer ethics
D)six commandments of computer ethics
Question
------------ is the right to be left alone to do as one pleases.

A)ipr
B)privacy
C)copy right
D)freedom
Question
Which state among the following is claimed Privacy is a basic human right?

A)united states of america
B)britain
C)india
D)netherland
Question
In India Cyber laws have been defined under the:

A)cyber law act, 2000
B)ethical computing law, 2005
C)it act, 2000
D)cyber act 2003
Question
----------------- comprise of a set of legal provisions to regulate the activities of cyber space or internet.

A)cyber ethics
B)cyber laws
C)it act 2000
D)internet laws
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/23
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 7: Copyright Policies, E-Learning, Cybersecurity, and Cyber Laws
1
The policy of ----------------- has allowed a range of exceptions to the copyright provision.

A)limited use
B)ipr
C)specific use
D)fair use
fair use
2
------------------ is based on the belief that the public is entitled to freely use portions of copyrighted materials for certain purpose.

A)limited use
B)ipr
C)specific use
D)fair use
fair use
3
WebCT is :

A)an virtual classroom package
B)a chat group
C)an e-learning tool
D)social network
an e-learning tool
4
------------- is the training, which delivers educational content through a web browser over the public or private interest.

A)ics
B)wbt
C)virtual classroom
D)cbt
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
5
-------------------- is the where a computer program provides motivation and feedback in place of a live instructor.

A)ics
B)wbt
C)virtual classroom
D)cbt
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
6
--------------- is the technology which captivate the student's interest.

A)wbt
B)virtual classroom
C)cbt
D)ict
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
7
-------------------- is meant for e-governance applications.

A)brnet
B)inflibnet
C)vast
D)nicnet
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
8
Spam means:

A)unwanted e-mail
B)virus
C)software
D)search engine
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
9
----------------------- are small text files that some web sites automatically store on your computer hard drive when you visit the site.

A)spam
B)cookies
C)adware
D)malware
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
10
Phishing is related to:

A)copy right
B)virus
C)e-learning
D)identity theft
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
11
------------------- contain information that is untrue.

A)cookies
B)virus
C)internet hoaxes
D)spam
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
12
A ---------------- defined as anyone who breaks into a computer system unlawfully.

A)hacker
B)virus
C)spam
D)internet hoaxes
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
13
-------------------- is a computer program that attaches itself to another computer program and attempts to spread it to other computers when files are exchanged.

A)hacker
B)virus
C)trojan horse
D)cookies
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
14
What is logic bomb?

A)hacker
B)virus
C)trojan horse
D)cookies
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
15
--------------------- slightly different from virus.

A)trojan horses
B)worms
C)logic bombs
D)cookies
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
16
A computer user copies an application onto more than one computer, if the license agreement does not permit this, is participating:

A)phishing
B)hacking
C)identity theft
D)software piracy
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
17
----------------- is an agreement between the user and the software developer.

A)copy right
B)software license
C)ipr
D)none of these
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
18
The Computer Ethics Institute of United States developed:

A)guide lines for fair use
B)free software program
C)anti-virus program
D)ten
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
19
------------------------- is treated as the bench mark for ethical computing.

A)copyright law
B)ipr law
C)ten commandments of computer ethics
D)six commandments of computer ethics
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
20
------------ is the right to be left alone to do as one pleases.

A)ipr
B)privacy
C)copy right
D)freedom
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
21
Which state among the following is claimed Privacy is a basic human right?

A)united states of america
B)britain
C)india
D)netherland
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
22
In India Cyber laws have been defined under the:

A)cyber law act, 2000
B)ethical computing law, 2005
C)it act, 2000
D)cyber act 2003
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
23
----------------- comprise of a set of legal provisions to regulate the activities of cyber space or internet.

A)cyber ethics
B)cyber laws
C)it act 2000
D)internet laws
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 23 flashcards in this deck.