Laws relating to protecting the internet and other online communication technology isa. Cyber Law b. Computer Law c. IT Law d. None of these

1 Answer

Answer :

b. Computer Law

Related questions

Description : The term used to describe a terrorist attack on a computer information system is a. Cyber Attack b. Cyber Terrorism c. Time Bomb d. None of the these

Last Answer : b. Cyber Terrorism

Description : Physical security is concerned with protecting computer hardware from human tampering and natural disasters and _____security is concerned with protecting software from unauthorized tampering or damage: a) Data b) Cyber c) Internet d) Meta Physical e) Publicity

Last Answer : b) Cyber

Description : Which one is a communication channel threat? a) Sniffer programs b) Cyber vandalism c) Integrity threats d) All of the above

Last Answer : d) All of the above

Description : Poverty can be reduced by a combination of solar energy, ___________ andthe internet. a. Genetic engineering. b. Cyber café. c. Nanotechnology. d. All of the above.

Last Answer : a. Genetic engineering.

Description : Poverty can be reduced by a combination of solar energy, ___________ andthe internet. a. Genetic engineering. b. Cyber café. c. Nanotechnology. d. All of the above.

Last Answer : a. Genetic engineering.

Description : Software program used to view web pages is a. Web Technology b. Web Browser c. World wide web d. HTML

Last Answer : b. Web Browser

Description : Software program used to view web pages is a. Web Technology b. Web Browser c. World wide web d. HTML

Last Answer : b. Web Browser

Description : The term used to describe a terrorist attack on a computer information system is- a. Cyber Attack b. Cyber Terrorism c. Time Bomb d. None of the these

Last Answer : b. Cyber Terrorism

Description : Theme of World Intellectual Property Day 2018 isa)Powering change:women in innovation and creativity b)'Innovation-Improving Lives' c)'Digital creativity :culture Reimagined' d)Movies-A Global Passion

Last Answer : a)Powering change:women in innovation and creativity

Description : The first owner of the question paper of an examination isa. Moderator b.Question paper setter c. Examiner d. None of these

Last Answer : b.Question paper setter

Description : First Supercomputer developed in India is a. Aryabhatt b. Cray-1 c. PARAM d. IBM-370

Last Answer : c. PARAM

Description : The first owner of the question paper of an examination is a. Moderator b.Question paper setter c. Examiner d. None of these

Last Answer : b.Question paper setter

Description : Which of the following are example of communication technology tools? a. Cell Phones b. Computer c. satellite system d. All of the these

Last Answer : d. All of the these

Description : Which of the following are example of communication technology tools? a. Cell Phones b. Computer c. satellite system d. All of the these

Last Answer : d. All of the these

Description : Which one of the following statements about Electoral Government in India is not correct? (1) The superintendence, direction and control of elections are vested in the Election Commission of India ... has the authority to scrutinize the validity of a law relating to delimitation of constituencies.

Last Answer : (4) The Supreme Court of India has the authority to scrutinize the validity of a law relating to delimitation of constituencies. Explanation: Under Article 82 of the constitution, ... the delimitation commission demarcates the boundary of parliamentary constituency on the basis of Delimitation Act.

Description : In which year UN General Assembly adopted the Convention relating to the Status of Refugees a. 1951 b. 1948 c. 1993 d. 1986

Last Answer : a. 1951

Description : The Protection of Human Rights Act 1993 describes‘Human Rights’as relating to a. Liberty. b. Equality. c. Dignity. d. All of these.

Last Answer : d. All of these.

Description : Consider the following statements about Internet facility: 1) It serves as the largest one-line information system. 2) It provides the most dependable and latest mode for sending E-mail. 3) Recurring ... communication E-mail is very high. 4) It is often misused and has triggered cyber-crimes.

Last Answer : 1) It serves as the largest one-line information system

Description : 'Genetic Engineering ' is related to a)Medical science b) Communication Technology c) Electrical Engineering d) Bio-technology

Last Answer : d) Bio-technology

Description : The basic function of technology 'Blue tooth' is to allow a)Landline phone to mobile phone communication b)Signal transmission on mobile phones only c)Satellite television communication d)Wireless communication between equipment.

Last Answer : d)Wireless communication between equipment.

Description : Read the following statements: I) Information and Communication Technology (ICT) is considered as a subset of Information Technology (IT) II) The 'right to use' a piece of software is termed as copyrights

Last Answer : II) The 'right to use' a piece of software is termed as copyrights

Description : Uses of Information & Communication Technology in Millitary area. GPS Technology b. Wireless Technology c. Satellite system d. All of these

Last Answer : d. All of these

Description : The use of information and communication technology to provide clinical health care from a distance is termed asa. Telemedicine b. Telecommunication c. Video Conferencing d. None of these

Last Answer : a. Telemedicine

Description : Uses of Information & Communication Technology in Millitary are a. GPS Technology b. Wireless Technology c. Satellite system d. All of these

Last Answer : d. All of these

Description : The use of information and communication technology to provide clinical health care from a distance is termed asa. Telemedicine b. Telecommunication c. Video Conferencing d. None of these

Last Answer : a. Telemedicine

Description : Considering non personal communication channels, social networking sites, email and company websites are considered as a) Broadcast media b) Display media c) Online media d) Print media

Last Answer : c) Online media

Description : Portal is a system of a) A gateway to information or news about a range of services b) Communication Medium c) Medium of exchange d) Online payment medium

Last Answer : a) A gateway to information or news about a range of services

Description : Data encryption techniquesare particularly useful for A. reducingstorage space requirements B. improving data integrity C. protecting data indata communication systems D. All of theabove E. None of the above

Last Answer : protecting data indata communication systems

Description : Name the primary law in India dealing with cyber crime and electronic commerce. -Technology

Last Answer : The primary law is Information Technology Act 2000.

Description : The notion that domestic violence is rooted in the society's laws and customs that reinforce male dominance is known as the a. Political model of domestic violence. b. Medical model of domestic violence. c. "Rule of thumb." d. Battered wife syndrome.

Last Answer : a. Political model of domestic violence.

Description : The murder of young brides by the husband and in-laws due to the demand of dowry is called ______. a. Dowry death b. Murder. c. Suicide. d. None of the above.

Last Answer : a. Dowry death

Description : If the President of India exercises his power as provided under Article 356 of the Constitution in respect of a particular State, then - (1) the Assembly of the State is automatically dissolved. (2) ... Article 19 is suspended in that State. (4) the President can make laws relating to that State.

Last Answer : (2) the powers of the Legislature of that State shall be exercisable by or under the authority of the Parliament. Explanation: The President's Rule can be proclaimed under Article 356... He can declare ... of the state legislature are to be exercised by the Parliament. So "B" is the right answer.

Description : Which one is a communication channel threat? a. Sniffer programs b. Cyber vandalism c. Integrity threats d. All of the above

Last Answer : d. All of the above

Description : What does the following definition refer to? "Achieving marketing objectives through the use of any electronic communications technology" a. e-business b. e-commerce c. e-marketing d. internet marketing

Last Answer : c. e-marketing

Description : What type of commerce is enable by technology a. Path-to-profitability b. E-commerce c. EBuy d. Internet

Last Answer : b. E-commerce

Description : What type of commerce is enable by technology a. Path-to-profitability b. E-commerce c. EBuy d. Internet

Last Answer : b. E-commerce

Description : A company wide network,closed to public access,which uses internet type technology is called a)Intranet b) Internet c) Extranet d)none of these

Last Answer : a)Intranet

Description : Mark the incorrect option relating to the knowledge and experience of the CIC/IC a) Law, science and technology b) Social service & management c) Journalism , mass media d) Cinema and Politics

Last Answer : d) Cinema and Politics 

Description : ______ is a branch of computer science which deals with helping machines finds solutions to complex problems in a more human like fashions A. Artificial Intelligence B. Internet of Things C. Embedded System D. Cyber Security

Last Answer : A. Artificial Intelligence 

Description : Which of the following do not corresponds to 4Ps of e- marketing a) Cost b) Customer Value c) Controlling d) Communication

Last Answer : c) Controlling

Description : Intranet means a) A network within a single company b) Between different groups c) Communication between customers and sellers d) Cannot say

Last Answer : a) A network within a single company

Description : Meaning of E-marketing refers to a) The increase in sales of mobile phones induces marketers in seeing mobile communication as the future scenario for marketing activities. b) Buying and selling on the spot. c) This is a marketing system occurring between two parties d) None of the Above.

Last Answer : a) The increase in sales of mobile phones induces marketers in seeing mobile communication as the future scenario for marketing activities.

Description : When preparing a website, designers should ensure that the site makes effective use of the text, pictures and video. This design feature is known as _________. a. communication b.connection c . c o n t e n t d . c o n t e x t

Last Answer : c . c o n t e n t

Description : INTRA-PERSONAL COMMUNICATION INVOLVES a) An individual talking to a group b) An individual communicating to a large number of people c) An individual thinking or talking to himself d) An individual talking to another individual

Last Answer : c) An individual thinking or talking to himself

Description : THE PROCESS OF COMMUNICATION NEEDS A SENDER, A RECIPIENT AND A.... a) Caprice b) Medium c) Channel d) None of these

Last Answer : c) Channel

Description : THE WORD COMMUNICATION IS DERIVED FROM A............. WORD. a) Latin b) Greek c) English d) French

Last Answer : a) Latin

Description : Which among the following is not included in the qualities a journalist? a) Irrational Thoughts b) High Quality Communication c) Obligation and promptness d) Professionalism

Last Answer : a) Irrational Thoughts

Description : The Magic Bullet theory of mass communication was evolved by: a) Ball Rokeach b) Klapper c) George Gerber d) None of these

Last Answer : d) None of these

Description : Intra Personal Communication is: a) Communication between two persons b) Inner monologues-communications within self c) Communication with more people d) Communication with masses

Last Answer : b) Inner monologues-communications within self

Description : The founding fathers of the mathematical or electronic theory of communication are: a) Roger and Berlo b) Shannon and Weaver c) McQuail and Windahl d) Blumer and Katz

Last Answer : b) Shannon and Weaver