Description : Which of the following applies to the implementation of an idea? a) Copyright b) Intellectual property c) Patent d) Denial of service attack
Last Answer : c) Patent
Description : What is the legal protection afforded an expression of an idea, such as a song, video game, and some types of proprietary documents? a. Ethics b. Intellectual property c. Copyright d. Fair Use Doctrine
Last Answer : c. Copyright
Description : What harnesses far‐flung computers together by way of the Internet or a virtual private network to share CPU power, databases, and database storage? a. Computer virus b. Worm c. Denial‐of‐service attack d. None of the above
Last Answer : d. None of the above
Description : What floods a Web site with so many requests for service that it slows down or crashes? a. Computer virus b. Worm c. Denial‐of‐service attack d. None of the above
Last Answer : c. Denial‐of‐service attack
Description : What is a type of virus that spreads itself, not just from file to file, but from computer to computer via e‐mail and other Internet traffic? a. Computer virus b. Worm c. Denial‐of‐service attack d. None of the above
Last Answer : b. Worm
Description : What would happen if all intellectual property (copyright, patent, trademark) laws were to be abolished?
Last Answer : Studio recordings and video would vanish overnight. There are large up-front costs involved with record production, and without copyright protection, it's difficult to impossible to recoup those costs. Musicians ... cheaper to print-on-demand rather than buying. This is still a few years off yet.
Description : The rights of an author or artist with respect to his/her creation are governed by the law of a)Patent b)Copyright c)Trademarks d)Intellectual designs
Last Answer : b)Copyright
Description : Unique value auction is mainly applies to? a. New products b. Second hand products c. Engineering products d. None of the above
Last Answer : b. Second hand products
Description : What consists of the identification of risks or threats, the implementation of security measures, and the monitoring of those measures for effectiveness? a. Risk management b. Risk assessment c. Security d. None of the above
Last Answer : a. Risk management
Description : Which of the following modes of entry does the domestic manufacturer give the right to use intellectual property such as patent and trademark to a man
Last Answer : Which of the following modes of entry does the domestic manufacturer give the right to use intellectual ... C. Joint Venture D. None of these
Description : The Term 'Intellectual Property Rights' covers a)Copyrights b)Trademark c)Patent d) All of these
Last Answer : d) All of these
Description : The ………………of Ford Motors Company is ‘Ford’. a. Patent b. Industrial Property Right b. Trade Mark c. Copyright
Last Answer : b. Industrial Property Right
Description : Which of the list below does not form Intellectual Property? A. Trade marks. B. Patents. C. Tangible assets. D. Copyright.
Last Answer : C. Tangible assets.
Description : Which of the following can a virus do? a. Hurt your hardware b. Hurt any files they weren't designed to attack c. Infect files on write‐protected disks d. None of the above
Description : Explain denial of service attack. -Technology
Last Answer : A denial of service attack is a type of attack that consumes all the resources of a computer.
Description : What floods a website with so many requests for service that it slows down or crashes? a. Computer virus b. worm c Denial-of-service attack d. None of the above
Description : Denial - of - service attack includes: a) a type of attack on a network that is designed to bring the network to its knees by flooding it with useless traffic b) DoS attacks are included in it. c) Both of Above d) None of These
Last Answer : c) Both of Above
Description : _______ is a form of denial of service attack in which a hostile client repeatedly sends SYN packets to every port on the server using fake IP addresses. a) Cybergaming crime b) Memory shaving c) Syn flooding d) Software piracy e) None of these
Last Answer : a) Cybergaming crime
Description : What is the purpose of a Denial of Service attack? a. Exploit a weakness in the TCP/IP stack b. To execute a Trojan on a system c. To overload a system so it is no longer operational d. To shutdown services by turning them off
Last Answer : c. To overload a system so it is no longer operational
Description : An attacker sits between customer and Banker, and captures the information from the customer and retransmits to the banker by altering the information. This attack is called as .............. (A) Masquerade Attack (B) Replay Attack (C) Passive Attack (D) Denial of Service Attack
Last Answer : (B) Replay Attack
Description : An attacker sits between the sender and receiver and captures the information and retransmits to the receiver after some time without altering the information. This attack is called as .............. (A) Denial of service attack (B) Masquarade attack (C) Simple attack (D) Complex attack
Last Answer : (A) Denial of service attack
Description : Which one is not a layer of E‐commerce infrastructure a. Physical layer b. Product layer c. Service layer d. None
Last Answer : d. None
Description : What is software that comes hidden in free downloadable software and tracks your online movements, mines the information stored on your computer, or uses your computer's CPU and storage for some task you know ... about? a. Web log b. Clickstream c. Anonymous Web browsing service d. None of the above
Description : Which service encompasses all technologies used to transmit and process information on an across a network? a. Interoperability b. Scalability c. Benchmarking d. Web services
Last Answer : d. Web services
Description : What is a model of a proposed product, service, or system? a. Prototyping b. Prototype c. Proof‐of‐concept prototype d. Selling prototype
Last Answer : b. Prototype
Description : A product or service that customers have come to expect from an industry, which must be offered by new entrants if they wish to compete and survive, is known as a(n)? a. Switching costs b. Loyalty programs c. Entry barriers d. Affiliate programs
Last Answer : c. Entry barriers
Description : HOw to patent or copyright an Internet Website Name?
Last Answer : http://www.worldwideocr.com/Copyright_website_design.asp
Description : Symbol of Maharaja of Air India is a)Copyright b)Patent c)Trademark d)All of the above
Last Answer : d)All of the above
Description : Right given to the Literary / Literature work, Artistic Craftsmanship, Engineering drawing and Software is a. Trademark b. Copyright c. Patent d. Industrial Design
Last Answer : b. Copyright
Description : Which opinion is not correct? (A) Education is a subject of concurrent list of VII schedule of Constitution of India (B) University Grants Commission is a statutory body (C) Patent, inventions ... D) Indian Council of Social Science Research is a statutory body related to research in social sciences
Last Answer : Answer: C State Election Commission: The power of superintendence, direction and control of all elections to the local government bodies vest with the State Election Commissions as envisaged in Article 243K ... of elections to the office of the President of India and the Vice-President of India
Description : With P2P and piracy growing faster than ever, do you think that the idea of intellectual property is coming to an end and that open source software is the rising star?
Last Answer : Maybe, but the growth of piracy is at the cost of open source. Many (if not all) open source programs compete on price, but if people get the other stuff for free, that’s one advantage less.
Description : Intellectual Property Rights (IPR) protect the use of of information and idea that are of a)Ethical value b)Social value c)Moral value d) commercial value
Last Answer : d) commercial value
Description : What price should I charge someone to design an e-commerce website?
Last Answer : answer:Heh, If I was using Joomla I'd be charging a lot, since I don't like Joomla ;^P In seriousness, it's hard to know how much to charge. I have run into this problem ... charged is for that specific set of requirements and that any additions not covered by the requirements will cost extra.
Description : The viruses spreads through‐‐‐‐‐‐‐‐‐‐‐‐‐ a. Mails b. Pen drives and cds c. Websites d. All the above
Last Answer : d. All the above
Description : The virus that are attached with vb and java files are called a. Macro b. Trojan horse c. Script virus d. None of the above
Last Answer : c. Script virus
Description : The virus that are commonly found in word documents are called‐‐‐‐‐‐‐‐‐‐‐‐‐‐ a. Macro b. Trojan horse c. Script virus d. None of the above
Last Answer : a. Macro
Description : During E‐commerce transaction we should ensure‐‐‐‐‐‐‐‐‐‐‐‐‐ a. Integrity b. Security c. Confidentiality d. All the above
Description : The study of encryption is called‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐ a. Decryption b. Cryptography c. Firewall d. All the above
Last Answer : b. Cryptography
Description : Which will harm computer resources a. Worm b. Virus c. Trojan horse d. All the above
Description : Which type deals with auction? a. B2B b. B2C c. C2B d. C2C
Last Answer : d. C2C
Description : What is an arrangement made between e‐commerce sites that direct users from one site to the other? a. Spam b. Viral marketing c. Affiliate programs d. None of the above
Last Answer : c. Affiliate programs
Description : Cyber slacking consists of what activities? a. Visiting “inappropriate” web sites b. Visiting news sites c. Chatting online with others about non‐work topics d. All of the above
Last Answer : d. All of the above
Description : Public key cryptography is also known as ‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐cryptography. a. Private key b. Symmetric c. Asymmetric d. None
Last Answer : c. Asymmetric
Description : Private Key cryptography is also known as ‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐cryptography. a. Public key b. Symmetric c. Asymmetric d. None
Last Answer : b. Symmetric
Description : Which one is not a threat for E‐commerce a. Trojan horse b. Viruses c. Worm d. None
Description : OTP stands for a. On Time Password b. On Time processing c. One time processor d. None
Last Answer : a. On Time Password
Description : which one is not an E‐payment method used in India a. Debit card b. Credit card c. e‐cheque d. none
Last Answer : d. none
Description : Which one is an online payment mode? a. Cash on delivery b. Cash before delivery c. Demand drafts d. e‐cheque
Last Answer : d. e‐cheque