unit sr.no. questions a b c d n0 unit 1 - phcasc

18
UNIT N0 Sr.No. Questions A B C D 1 1 In march 1999, which virus caused an estimated damage to US $80 million paralyzing email system CD universe Melissa Slammer Nesses 1 2 Which of the following is not a type of cyber-crime? Data theft Forgery Damage to data and systems installing antivirus for protection 1 3 Cognizable offences as described as It is the offence in which a police officer can arrest the convict without the warrant. It is a bailable offence. The police officer is bound to register the FIR even with the permission of Magistrate. FIR not submit 1 4 Punishment for Breach of Confidentiality and Privacy of IT Act offence is Imprisonment up to 2 years Imprisonment up to 3 years Imprisonment up to 5 years Imprisonment up to 10 years 1 5 Which are the grounds which section 80 covers to commit of not having committed of committing not to commit 1 6 What is not the definition of Hacking The gaining of unauthorized access to data in a system or computer. Breaking into computer system Deliberate deception to secure unfair or unlawful gain valid concept 1 7 Section 470 of IPC describes Forgery for purpose of cheating Forged document Forgery for the purpose of harming reputation Making forged document 1 8 Who are not the authority for justice dispensation system for cybercrimes? Controller of Certifying Authorities Certifying Authority High Court Adjudicating Officer 1 9 crime Trace and Trap GPS Encryption Bluetooth 1 10 ___ Harassment Defamation Abuse Damage 1 11 To be considered a computer crime, what needs to be involved in the crime. Computers Technology Data Networks 1 12 Under which section of IT Act, stealing any digital asset or information is written a cyber-crime. Section 69 Section 65 Section 67 Section 70 1 13 In which year India’s IT Act came into existence? 2003 2001 2002 2000 UNIT 1

Upload: others

Post on 18-Dec-2021

2 views

Category:

Documents


0 download

TRANSCRIPT

UNIT N0

Sr.No. Questions A B C D

1 1In march 1999, which virus caused an estimated damage to US $80 million paralyzing email system

CD universe Melissa Slammer Nesses

1 2 Which of the following is not a type of cyber-crime?Data theft Forgery

Damage to data

and systems

installing antivirus

for protection

1 3 Cognizable offences as described as

It is the offence in which a police officer can arrest the convict without the

warrant.

It is a bailable offence.

The police officer is bound to register the FIR even with the permission

of Magistrate.

FIR not submit

1 4Punishment for Breach of Confidentiality and Privacy of IT Act offence is

Imprisonment up to 2 years

Imprisonment up to 3 years

Imprisonment up to 5 years

Imprisonment up to 10 years

1 5 Which are the grounds which section 80 covers to commit

of not having committed

of committing not to commit

1 6 What is not the definition of Hacking

The gaining of unauthorized

access to data in a system or computer.

Breaking into

computer system

Deliberate deception to

secure unfair or unlawful gain

valid concept

1 7 Section 470 of IPC describes

Forgery for purpose of cheating

Forged document

Forgery for the purpose of harming reputation

Making forged document

1 8Who are not the authority for justice dispensation system for cybercrimes?

Controller of Certifying Authorities

Certifying Authority

High Court Adjudicating Officer

1 9Which device or tool is used by cops to tackle cyber crime Trace and Trap GPS Encryption Bluetooth

1 10Injury done to the reputation of person is called as ___ Harassment Defamation Abuse Damage

1 11To be considered a computer crime, what needs to be involved in the crime.

Computers Technology Data Networks

1 12 Under which section of IT Act, stealing any digital asset or information is written a cyber-crime.

Section 69 Section 65 Section 67 Section 70

1 13  In which year India’s IT Act came into existence? 2003 2001 2002 2000

UNIT 1

UNIT N0

Sr.No. Questions A B C D

1 14

IT Act 2008 make cyber-crime details more precise where it mentioned if anyone publishes sexually explicit digital content then under ___________ of IT Act, 2008 he/she has to pay a legitimate amount of fine.

section 67-A section 69-A section 66-A section 72-A

1 15What is the person called when they try to hurt a group of people with the use of a computer.

Cyber Terrorist Whitehat intruder Cracker Social Engineer

1 16What is the name of the IT law that India is having in the Indian legislature?

India’s Information Technology (IT) Act, 2000

 India’s Technology (IT) Act, 2000

India’s Digital Information Technology (DIT) Act, 2000

 The Technology Act, 2008

1 17Non cognizable offence is an offence in which a police-officer cannot arrest any person without

Notice Warrant Authority Letter permission

1 18 The example of computer crime are: Software creation  data check  Cracking software licence

1 19Cyber crime is aware of no geographical limitations, boundaries or distances.

FALSE TRUE

1 20

What type of cyber-crime, its laws and punishments

does section 66 of the Indian IT Act holds?

Putting antivirus into the victim

 Stealing dataCracking or illegally hack

into any system

Stealing hardware components

1 21

If anyone publishes sexually explicit type digital content, it will cost that person imprisonment of _________ years.

4 5 3 2

1 22What worm emailed people with the words "I LOVE YOU' in the year 2000?

The Love Bug The Love The valentine connection

The darling Link

1 23An offence in which bail can be granted to the accused as of right is called___

Schedule offenceNon bailable offence

Bailable offence non schedule offence

1 24 Which of the following is not a type of cyber crime?

Installing antivirus for protection

Data theft ForgeryDamage to data and systems

1 25

What is the punishment in India for stealing

computer documents, assets or any software’s source code from any organization, individual, or from any other means?

 3 years of imprisonment and a fine of Rs. 500,000

6 months of imprisonment and a fine of Rs. 50,000

1 year of imprisonment and a fine of Rs. 100,000

2 years of imprisonment and a fine of Rs. 250,000

UNIT N0

Sr.No. Questions A B C D

1 26 Which is reason for delaying the justice are____

All of theseThe population of India is increasing.

Government Negligence

The lack of responsibility and sensitibility and

having slow attitude.

1 27 The punishment for criminal hacking is___________

up to 1 years or fine upto 1 lakhs or with both

up to 2 years or fine upto 21 lakhs or with both

up to 4 years or fine upto 2 lakhs or with both

up to 3 years or fine upto 2 lakhs or with both

1 28An offence in which bail can be granted to the accused as of right is called___

Non bailable offence

Bailable offenceSchedule offence

corrective actions

1 29An attempt to harm, damage or cause threat to a system or network is broadly termed as ______

System hijacking Cyber-crime Cyber Attack  Digital crime

1 30Which sections for Monetary penalties, adjudication and appeals under IT Act, 2000

Section 43,44,45 Section 42,44,46 Section 42,44,47 Section 42,44,48

1 31 When IT ACT 2000 came into effect? 17 October, 2000 11 November, 2000 17 October, 2001 11 November, 2001

1 32Which one of the following is outside the scope of IT Act

2000A. Electronic gift

Power of Attorney

with digital

Electronic

messageElectronic Evidenc

1 33 The term Cyber Law means law governing _________Electronic Transactions

Cyber SpaceElectronic Commerce

cyber crime

1 34Which of the following are issues addressed by cyber

law?

Cyber transactionsElectronic

marketing

Intellectual

property rights and Data

Protection and

data concept

1 35 Which one is within the scope of IT ACT?

Trust

Electronic Agreement of sale of

immovable property with digital

Will Truncated Cheque

1 36Which act states the statement "80 Power of police

officer and other officers to enter, search etc."

Information

Technology act 1990

Code of criminal procedure, 1973

Section 80

Information Technology act

code of criminal procedure, 1974

1 37 Non cognizable offence refers to what?

Police can take

actionPolice can file FIR

Police have no

authority to

aprehend a person for crime.

Police can arrest

without warrant

1 38When the accused if found at public place, all the IT Act offences would become _____________.

non cognizable criminal Heinous Cognizable

UNIT N0

Sr.No. Questions A B C D

1 39 What is full form of FIR ?False information record

First Information Record

First information report

Future information report

1 40Arrest and investigation of offences under IT Act and

other Cyber Crimes should be conducted by whom?

A Police officer not below the rank of

DGP

A Police officer not below the rank of

DSP

A Police officer not below the

rank of Sub

A Police officer

1 41What are the grounds of arrest as per section 80 of IT Act 2000?

of having

committedof commiting

of being about to

commitAll of the above

1 42Which of the following statements are correct about

cyber crime and cyber criminal?

Geographic

distances and borders are

revelant to cyber

crime.

A cyber criminal

sitting in one corner of the globe may hack into the

victim's bank's

computer located in

another corner.

A cyber criminal is here, there,

every where and

yet nowhere

None of the above

1 43

A has committed offence of hacking from his house, under IT Act section 66. Which of the following

statements is correct?

After commiting offence, A goes to

hotel. He can be arrested without

warrent.

After committing offence, he remains

at home. he cannot be arrested without

warrent as per

section 80.

Cannot be arrested at all.

Can be arrested only at public place

1 44

"If A from a cyber café in Mumbai, is alleged to have hacked the defence systems installed in computer network in Defence Ministry at Delhi." Which of the

following statement is correct in this context.

He cannot be arrested without warrant , if he remains in cyber

café or found in

He can be arrested without warrant , if he remains in cyber café or found in

some public place

He can be

arrested without

warrant , if he goes home

None of the above

1 45 Cyber crime is criminal activity which can be conducted

using what of the following?computer, network

or network deviceRevolver Using Internet

1 46How much time was taken by the famous "I Love You"

virus to spread all over the globe?2 Hours 2 Weeks 1 Hour 30 Minutes

1 47 Who are Phreakers?

Who have

knowledge of computer operations

Who have deep knowledge of

internet and telecommunication systems.

Who have

knowledge of high level languages.

Who have knowledge of cryptography

UNIT N0

Sr.No. Questions A B C D

1 48 Who are the code hackers?

who have knowledge of telecommunication

systems.

Those who have the

knowledge of coding language.

Those who have knowledgeof

intricacies of computer

systems and their

Who have Knowledge of internet

1 49 Hacking refers to __________breaking into a

house

breaking into

computer system

breaking into a

mobile phonestealing information

1 50Which section 0f IT Act 2000 defines punishment for hacking? 77(3) 80(1) 66(1) 90(2)

1 51 The offence of cheating in india is called ______. 220 320 120 420

1 52Cheating is defined in the Indian penal code under which section?

678 233 415 420

1 53 Section 405, 406 are for which offence? murder cheatingcriminal breach of trust

cyber crime

1 54Types of ecommerce transactions include what of the following? Information Access

Interpersonal

communicationshoping services All the above

1 55A _________ agreement is mostly found as part of the

installation process of software packages.click-wrap

click-wrap contracts

Type and click icon clicking

1 56

The click-wrap agreement should be stated in a

manner such that it can be viewed before the option of acceptance or rejection is exercised

TRUE FALSE

1 57 The person making the proposal is called the ____ promiser proposal maker proposal acceptor all of the above

1 58In India, there is no decision on the validity of a shrink-wrap contract.

TRUE FALSE

1 59Non-disclosure/confidentiality clauses seek to protect ________ property

private confidential sufficient intellectual

1 60

The mechanism of arbitration has been strengthened by legislating the Arbitration and Conciliation act,1996,which is based on __________

Jurisdictional law Arbitrators lawUnicitral model law

Foreign arbitration law

1 61 Which of the following statements are correct?

In year 2017, hackers from Pakistan hacked 40

Indian web-sites.

The group of hackers, called G Force Pakistan hacked Indian

organizations

Pakistan Hackers club has hacked sites of Indian

Parliament.

All of the above

1 62 Cyber crime is increasing at what rate? 10% per week 5.2% per month 4.1% per week 4.1% per year

UNIT N0

Sr.No. Questions A B C D

1 63

Any person intentinally destroys or alters any computer source code, when it is required to be kept by law, is said to commit the offence and is punishable with

imprisonment upto 4 years

imprisonment upto

3 years or fine upto 2 lakhs or both

fine upto 4 lakhsimprisonment upto 1 year

1 64

A person who unauthorizedly secures access to a protected system as declared by a notification in the

official gazette by the Government shall be liable for

which punishment?

Imprisonment upto

15 years and liable to fine

Imprisonment upto

12 years and liable to fine

Imprisonment

upto 10 years and liable to fine

Imprisonment upto 8

years and liable to fine

1 65 Who are Network service providers as per IT Act?

ISP who offer

services such as hosting content

Access providers who specialize in

offering access to the internet

Online service providers who

provide proprietry

content for

All of the above

2 1

 buying and selling of goods and services, or the transmitting of funds or data, over an electronic network, primarily the internet is known as

E Commerce E contract E Business E Market

2 2

According to the IT Act, 2008 is a person who sends, generates, stores or transmits any electronic message to be sent, generated, stored or transmitted to any other person and does not

include an Intermediary is known as

Originator Addressee Agent Leader

2 3

according to the IT Act, 2008 is a person who is intended by the originator to receive the electronic record but does not include any Intermediary

Originator Addressee Agent Leader

2 4 make a proposal is called as Agreement Contract Offer Deal2 5 “invitation to treat” is one types of a Agreement Contract Deal Offer

2 6

Necessary element for determining knowledge of

the offeree and acknowledgement is received by him then called as

Offer Completed Agreement Completed

Offer Partial Completed

Offer InCompleted

2 7

The offeror is able to revoke the offer any time

After the communication of acceptance is complete 

before the communication of acceptance is complete 

After Agreement Before Contract

2 8

Which one of the following element is not necessary for a contract ? Competent parties

Reasonable terms and conditions.

Free consent Lawful consideration

UNIT 2

UNIT N0

Sr.No. Questions A B C D

2 9

Which one of the following element make contract void ?

Acceptance Free Consent Unlawful Object Lawful consideration

2 10Which of the following is cannot be contractual Party?

Autonomous Computer

Originator AddresseeNatural And Legal Person

2 11 EULA stands for?End-user Agreement

End-License Agreement

End-user License Agreement

End-user Loyalty Agreement

2 12 The person making Proposal is called as Promisee Promisor Accepter Dealer2 13 The person accepting Proposal is called as Promisee Promisor Accepter Dealer

1 14

agreements are those which can only be read and accepted by the consumer after the opening of a

particular product is called as Shrink Wrap Click Wrap Click Shrink Browse-Wrap

2 15

Agreement comes into force when an online buyer or user clicks on the I AGREE button on a webpage to purchase or download a program is called as

Click Wrap Shrink Wrap Browse-Wrap Click Shrink

2 16 Installing software from a CD into your PC is an example of a

Click Wrap agreement

Click Shrink agreement

shrink wrap agreement.

Browse-Wrap agreement

2 17

Choosing to make payments online or choosing to

reject it is an example of aClick wrap

agreement.

Click Shrink

agreement

shrink wrap

agreement.

Browse-Wrap

agreement

2 18

Which one of the following element is not necessary for a contract ? Offer Acceptance

Unlawful Consideration

Free Consent

2 19

Which one of the following element is necessary for a contract ?

Autonomous Computer

Certainty of terms Anonymous Computer

Incompetent Parties

2 20

Which one of the following element is necessary for a contract as a Competent Parties ?

Autonomous Computer

Incompetent Parties

Anonymous Computer

Natural And Legal Operator

2 21

An enforceable agreement created and signed in electronic form—that is to say, no paper or other hard copies are used is called as

E Commerce E contract E Business E Market

2 22

An agreement becomes a contract if :It is by free consent of the parties.

Parties are competent.

It is enforceable by law.

Acceptance

UNIT N0

Sr.No. Questions A B C D

2 23

Which one of the following element is not necessary for a contract of E-Commerce ? Entire Agreement Warranties Garantee Arbitration Clauses

2 24

Which one of the following element is not

necessory to make agreement void? Fobidden By lawExpiry of Specific Period

Infringe Right of Parties

Goverment Law Clause

2 25 EDI stands forElectronic Data Interchange

Electronic Data Intersect

Electronic Domain Interchange

Electronic Data Internet

2 26 e-commerce transactions defineinformation access

non virtual enterprises

personal communication

intrapersonal communication

2 27 the law of contract is stated inindian contract act 1872

sale of good act 1930

indian contract act 1972

consumer act

2 28 icon clicking is also known as type and click click wraptake-it-or-leave-it

shrink wrap

2 29the person making proposal as per indian contract act is known as

promise proposal promisor agreement

2 30 section 4 and 5 of indian contract act statedcommunication of offer

rejection non revocation admissibility

2 31 contract formation creates a relationship ofrights obligations proposal rights and obligations

2 32 cyber world section 11 of IT Act 200 provides e-commerce e-record contract place2 33 contract formation on internet determine time and place system contract name

2 34 section 26 of indian contract act statedbusiness

restraint of marriage

property legal concept

2 35 warranties term consider inIT act 2000

sale of good act

1930

data protection

actIndian contract act

2 36 arbitration clause defined non procedural jurisdictional productive non scheduling2 37 arbitration and concillation act enacted at 1997 1996 1998 2000

2 38which section provides mechanism of appointment of arbitral tribunal

section 11 section 12 section 11(1) section 10

2 39 non-disclosure or confidentiality clause stated inemployment

contract

sale of good act

1930arbitary act data protection act

2 40 trust is defined in actsection 3 of indian trust act

section 2 of indian trust act

section 1 of indian trust act

section 4 of indian trust act

UNIT N0

Sr.No. Questions A B C D

2 41 section 2 of indian contract act defineconcept of proposal

concept of trustconcept of sale of goods

concept of technology

2 42 UCC stands foruniform contract code

uniform commercial code

uniform commercial case

uniform contract code

2 43a person who intended by originator to receive electronic record is

promisor addressor addressee party

2 44 confidentiality clause defineagreement contract document

seek to protect intellectual property

2 45 arbitration agreement includes document no claim communication detailed work2 46 copyright act enacted in 1958 1957 1956 19602 47 software licence is exclusive right non-exclusive static movable

2 48 e-records based on which areastime and place

receipt of information

contracttime,place and receipt

2 49 section 12 and 13 of IT Act 2000 signifies proposal licencecontract formation

refusal of work2 50 software licence agreement based on shrink wrap click wrap tender agreement

2 51

The risk of websites facing litigation in foregin

lands thereby causing them____________.Extreme Loss Easy Hardship

Extreme

HardshipExtreme Compition

2 52

Inconsistent and ___________ decisions of the

courts on the applicability of the law of jurisdiction

to the cyber world.

Easy Harsh Regular Pending

2 53

__________ Jurisdiction implies jurisdiction based

upon monetary limit.Pecunairy Subject Matter Territotial Appellate

2 54

__________ that the court has the authority to hear

the type of case or controversy initiated in its court.Pecunairy Subject Matter Territotial Appellate

2 55

the ___________ provide the power for a higher

court to review a lower courts decision.Pecunairy Subject Matter Territotial Appellate

2 56

The concept of ________________ has been

explained by the courts time and again.Cause of action Law Judgement Remedy

2 57

_____________ means the whole bundle of

material facts which are necessary for the plaintiff

to prove in order to entitle him to succeed in the

Judgement Cause of action Subject Matter Appellate

UNIT N0

Sr.No. Questions A B C D

2 58

Based on the principle of _____________ , the

courts in India also have jurisdiction over Cause of action Subject Matter Territotial Appellate

2 59

The ____________ also clarifies that the stipulated

place of despatch and receipt of electronic records

is notwithstanding the fact that place where the

computer resource is located.

IT Act 2000 IPC Contract ActThe Repealing and

Amending Act

2 60

Our ________________ provides that a foreign

judgement is conclusive on matters directly

adjudicated upon between the parties.

IT Act 2000Criminal

Procedure Code

Civil Procedure

CodeContract Act

2 61

Contractual and ___________ disputes are likely to

dominate amongest the litigations, directly or

indirectly, arising out of , or in connection with, the

internet and e-commerce.

IPR Cyber Crime Family Business

2 62

Which one of the following statements is not

correct in relation to passing off?

The date

goodwill should

be assessed in a

passing off action

is the date the

defendant's acts,

of which

complaint is

To be guilty of

passing off a

trader must have

made a

misrepresentation

with the intention

of capturing some

of the business of

A trader has a

property right in

respect of the

goodwill

associated with

his business

A trader guilty of

passing off commits

a tort

2 63

The law of ___________ is of significance to e

commerce and would have wide ramifications.Contact Act IT Act 2000 Exclusion Clauses Consumer Law

2 64

___________ generally take the view that the

parties ought to excercise care while entering into a Court Agent Goverment Owner

2 65

The ___________ requirement in determining

personal jurisdiction ensures that a nonresident

defendant will not be haled into court based upon

"random, fortuitous or attenuated" contacts with

Non purposeful

availment

Purposeful

availment

Minimium

ContcatContract

3 1 DNS stands for Domain Name System

Domain Name Source

Domain Name Service

Domain Name Search

3 2 Unauthorized use of trademark is known as Cyber Haking Cyber-squatting Hacking Cyber Spacing

UNIT 3

UNIT N0

Sr.No. Questions A B C D

3 3  UDRP stands for

Uniform Dispute Resolution Policy

Name Resolution Policy

Uniform Domain Name Dis

pute Resolution

Unique Domain Name Dispute Resolution

Policy

3 4 ICANN stands for

Internet

Corporation for Assigned Names

and Numbers

Internet Connetion

for Assigned Names

and Numbers

Intranet

Corporation for Assigned Names

and Numbers and

Interlink Corporation

for Allocated Names

and Numbers

3 5 in Case of Cyber Squatting ACAP stands for

Agile Cybersecurity Action Plan

Anticybersquatting Council Protection

Act

Anticybersquatting Consumer

Protection Act

Anticybersquatting Communication

Protection Act

3 6

Un-authorized use of other’s trademark which may leads to trademark infringement and or passing-off is known

asMeta-tagging Meta-Hacking Meta-Fixing Meta-Catching

3 7 Who administer UDRP? WTO WIPO Supreme Court High court

3 8 NASSCOM stands for

National Alteration

of Software and Service Companies

Non Association of

Software and Service Companies

National

Association of System and

National Association of

System and Squatting Companies

3 9 Trademark related Organization RIAA stands for

Recording Industry

Association of Africa

Repeate

Instrumental Association of

Rework Industry

Allocated of America

Recording Industry

Association of America

3 10The remedies available for infringement of copyright does NOT include which of the following:

Injunction Account of profits Rectification Damages

3 11The intentional copying of a registered design

constitutes which ONE of the following? No breach of the owner's rights

An offence under equity

A criminal offence

A civil offence

3 12

The 'apple' logo of the Apple Corporation is an example of which of the following?

Copyright Patent Design right A trade mark

3 13 What is the full form of ITA-2000?

Information Tech Act -2000

Indian Technology Act -2000

International

Technology Act -

2000

Information Technology Act -2000

3 14

The term “WIPO” stands for:World Investment policy organization

World intellectual property organization

Wildlife

Investigation and Policing organization

World institute for Prevention of organized crime

3 15

A company wishes to ensure that no one else can use their logo.

Copy rights Trade mark PatentIndustrial designs

UNIT N0

Sr.No. Questions A B C D

3 16The term of copyright for an author lasts how long?

The life of the author

The life of the author plus 60 years

95 years75 years

3 17

Which of following would not gain copyright protection?A DVD

An unrecorded

speech

Written lyrics of

a song A hand knitted jumper

3 18

Which one of the following actions is not a breach of

copyright?To import copied

CDs.

To make a copy of a

CD and sell it.

To borrow a CD from a friend and

copy it to your laptop for your own private use.

To purchase a CD and

copy it to your laptop for your own private use.

3 19

The act of unauthorized copying or downloading of a program from a network and making multiple copies of

it is

PlagiarismNetwork piracy

Software piracy Site-license piracy

3 20 Napster and Its Cousins Case Related to

ideas Music and broadcasts

Typological arrangements of published

editionsDramatic productions

3 21Napster and Its Cousins has developed system is called as Peer to peer Link to link Share To Share Host to Host

3 22 Conclusion of an alternative for Napster SongsPk Digital Library Digital Songs Free Songs for All

UNIT 4

4 1Digital signatures are based on ___________key encryption. private public shared internal

4 2Digital signatures created and verified using_____________ program graphical coding html cryptography

4 3 A _________is an entity that issues digital Certificate.Certificate

Authoritysubscriber holder Controller

4 4

A_________has been empowered to revoke a Digital signature Certificate issued by it upon the death of the subscriber.

Certificate Authority

subscriber commissioner Controller

4 5

The __________may appoint Deputy Controllers and

Assistant Controllers.

Central Government

state governmentcommissioner of Certifying

Authority

Controller of Certifynig Authority

4 6Controller of Certifying Authorities(CCA) works under_______

Prime Minister Office

Reserve Bank of india

Ministry of communication &IT

autonomous body

UNIT N0

Sr.No. Questions A B C D

4 7The Section deals with legal recognition of electronic records is__________

Section3 Section5 Section6 Section4

4 8

The_________section enables publication of the rule,regulation,order,bye-law,notification or any

other matter to be published in official gazetteSection4 Section8 Section7 Section5

4 9

a licence to act as a Certifying Authority is valid for a period of ___year from the date of issuance and same is not trnasferable

3 year 4 year 5 year lifetime

4 10

The"PRISM"the land record system in punjab stands

for____

Punjab Registraion International

Service Module

Punjab Registraion Information

System Module

Punjab Registraion Internet System

Module

Punjab Registraion International Source

Module

4 11The __IT Minister has declared the year 2001 as the year of 'e-governance'.

Mr.Pramod Mahajan

Mr.LK Advani Mr.Sushil shinde Mr Muli joshi

4 12The Controller to maintain a database of disclousure record of ____

non Certifying Authority only

Cross Certifying Authority only

Foreign Certifying only

Cross foreign certification

4 13Income tax is collected on all types of income except _______________.

Agricultural Income

Industrial Income Capital Gain Household Property

4 14 OECD stands for_________

Organisation for Economic

Corporation Development

Organisation for

Economic Developmental

Organisation

and Educational Corporation

organisation

corporation

4 15The Income tax act, 1961 came into force w.e.f __________ 1st April, 1961 31st March, 1961

    1st April, 1962

31 st march

4 16An individual is said to be resident in India if _______________.

It is in India in the previous year for a period of 182

days or more

It is in India for period of 70 days

or more during the previous and 365 days or more during the four years immediately proceeding previous year

It is in India in the previous year for a period of 180 days or more

It is in India for period of 70 days or

more during the previous and 361 days or more during the four years immediately proceeding previous year

4 17 DTAA stands for _________

Double Taxation Avoidance Agreement

Data Taxation Avoidance Agreement

Double Taxed Agreement Act

Double Taxable Agreement Act

UNIT N0

Sr.No. Questions A B C D

4 18______________section of Income-Taxwhich states about the agreement with the foreign countries.

section 95 Section 85 Section 91 Section 90

4 19In___________ possibilities the two countries have an agreement for DTAA.

The income taxed

is only in one country.

The income is

exempted in many countries

The income is

taxed in specific countries

credit for tax paid in

one country is given against tax payable in the other country

4 20

An__________Privacy policy is your everyday practicing,collecting,managing and using data from site visitors.

E-Banking E-CommerceInformation Technology

Taxation

4 21Online Privacy is essential for ______________visitors and customers.

E-Commerce Transaction E-Banking E-mail

4 22

Which of the following type of transactions cannot be exhaustively covered by the provisions of Permanent Establishment covered in DTAA?

E-Commerce Transaction

Royalty transactions

Business Process Outsourcing Transactions

Interest Payments

4 23Which model is not a part of Permanent Establishment? UN model OECD model US model ISN model

4 24

OECD model is a model treaty between

_______________nations. Developed Developing

developed and

developingnon developing

4 25 principal of taxation internally arenon resident

basedsource based receiver based public based

4 26 indian income tax act was enacted in 1961 1962 1963 1964

4 27 structure of article 5 definepermanent establishment

temporary establishment

detailed list procedural list

4 28 DTAA stands for _________

double tax avoid

agreement

double tax avoidance

agreement

double tax apply

agreement

double tax

application agent

4 29In which case two countries have an agreement for double tax avoidance

income is taxed only one country

no exempt in both countries

income is taxed in many countries but credit for tax unpaid

income is taxed in boundries

4 30 DTAA is of which typecomprehensive limited

comprehensive

and limiteddetailed

UNIT N0

Sr.No. Questions A B C D

4 31 tax treaty in international tax planning determine

do not facilitates collection of tax

contributes attainment of international development

does not give investment

procedural work

4 32 OECD model issued in 1978 1992 1994 1989

4 33UN model convetion happens between which countries

developed developing developed and developing

non developing

4 34which section states income tax agreement with foreign countries

90 91 92 93

4 35 taxation entities based upon resident ordinarily resident

not resident perfect resident4 36 indian company act year 1955 1956 1957 1959

4 37which section provide a mechanism for collecting income tax

160 161 160 and 161 163

4 38 section 3 of it act 2000 describesauthentication of electronic records

cryptosystem security decryption

4 39 asymmetric cryptosystem is known aspublic key cryptography

protected key cryptography

encryptioninternal key encryption

4 40 digital certificates are issued by state governmentcertifying

authority

judicial

committeemagistrate

4 41 revocation of digital signature certificate defined in section 38 secttion 39 section 40 section 41

4 42 Controller of Certifying Authoritiesnot supervision

not certifying public keys

specifying qualifications

provide concept

4 43how much amount have to pay for licence of certificate 24000 25000 20000 23000

4 44digital signature certificate application approved or rejected shall be stated

rule 33 rule 34 rule 32 rule 31

4 45 e-governance definee-records signature

e-records and signature

IT act

4 46 section 5 of it act 2000 explain e-records legal recognition digital signature illegal recognition

4 47 retention of electronic records explain insection 7 of it act 2000

section 8 of it act 2000

section 9 of it act 2000

section 1 of it act 2000

4 48 CA play rolenot issue digital

signature

manage digital

signatureprovide details not provide data

4 49 suspension of digital signature certificatesection 38 section 37

subsection(1) of section 37

subsection(1)of section 38

UNIT N0

Sr.No. Questions A B C D

4 50 subsection(1) of section 41 of it act 2000 defineacceptance of digital signature

rejection of digital signature

suspension of digital signature

approval of digital signature

5 1 what is a meaning of deficiency.default

inadequacy in the

quality

changes in

qualitychanges in quantity

5 2 which practices in the provision of services.manufacture of superiors goods

finishing or packaging

design utility of goods

5 3 motor at 40% discount.

false offer of bargain sale

offering pricesnon compliance to prescribed standard

refusing to sell on unjust grounds

5 4medicines not manufactured according to standards.

hoarding, refusalof goods

non compliance to prescribed standard

false offer of bargain sale

offering gifts

5 5 examine the expiry date of the product to buy.beware consumers

restrictive trade practices

TELCO superior goods

5 6district forum shall entertain the complaint upto the value.

10 lakhs 15 lakhs 20 lakhs 25 lakhs

5 7Every members of the forum shall hold office for a term of years.

5 years 3 years 10years 7 years

5 8commission shall entertain complaints where the value of complain dose not exceeds ₹ 1crore.

district commission

state commissionNational commission

none of these

5 9 Central Government shall establish a commission.National commission

district commission

state commission

international commission

5 10

National commission may prefer an appeal to

supreme court within days from the date of order.40 days 15 days 30 days 20 days

5 11

the foreign manufacturer or distributors are made or may not be liable for manufacturing defects on for unfair practices.

under the UPA under the CPA under the JPA under the MPA

5 12

it deals with amendments to the Indian evidence act.it pertains to the inclusion of electronic document in the definitions of evidence.

schedule 1 schedule 2 schedule 3 schedule 4

5 13 Misleading buyers about another goods or services.

false representation

refusal of goods spurious goodsnon compliances to prescribed standard

UNIT 5

UNIT N0

Sr.No. Questions A B C D

5 14cyber consumers in India are protected under which act.

RTI actconsumer protection act

contract act cyber law

5 15how to protect the consumer from unfair trade practices. quantity measurement impurity product concept

5 16

It spreads awareness so that consumer can know

about the various redressal agencies where they can approach to protect their interest.

unorganised consumer

wide spread

exploitation of consumers

consumer ignorance

consumer education

5 17 consumer have rights.right to accept right to choice right to create rights and obligations

5 18

were there are numerous consumer having a same interest, with the permission of the district forum,

on behalf of, or for the benefits of, all consumers so interested.

one or more

consumersthe consumer

any recognised consumer

association

the central or the

state government

5 19 the complaint should contain the. name value data technique

5 20

refer a copy of admitted complaint within a how many days from the date of its admission of the opposite party mentioned in the complaint.

30 days 10 days 21 days 45 days

5 21 The indian evidence act was enacted in 1870 1871 1872 18735 22 The indian evidence act section 3 defines documents agreement facts process

5 23oral or documentary include in which section of indian evidence act

section 17 section 18 section 19 section 20

5 24 section 3 of indian evidence act describedocument perception

Agreement information procedural work

5 25the defination of e-record,data and computer system described

section 2 of IT Act,2000

section 2(1) of IT Act,2000

section 1(a) of IT Act,2000

section 3(a) of IT Act,2000

5 26 secondary evidences includescopies not made from original

insure changes of copy

copies comparison

copies verification

5 27subsection(1) of section 65B of indian evidence act defines

relavancy admissibility proof verification

5 28opinion as to digital signature when relavant described in section 22 A section 22 B section 47 A section 47 B

5 29under which section author of an e-record is a person who may give certificate

65 A 65 B 65 C 65 D

5 30 types of electronic evidence verbal documentary filing no communication

UNIT N0

Sr.No. Questions A B C D

5 31 documentary evidence mention

documents presented in court for inspection

define circumstances

recording presentation

5 32 section 73(A) of indian evidence act define

proof to

verification of digital signature

validation of digital signature

records assignment

5 33 securing digital signature mention insection 10 of it act 2000

section 15 of it act 2000

section 11 of it act 2000

section 12 of it act 2000

5 34presumption as to electronic messages defines in section 88 A 88 B 88 C 88 D

5 35 bankers books evidence act enacted in 1891 1892 1893 1894

5 36 CPA stands forconsumer protection act

consumer profit act

consumer profitability act

customer concept

5 37 consumer rights in CPA includes right to deal right to heard right to part right to destroy

5 38according to section2(7) of sales of goods act,goods means

product commoditymovable property

immovable property

5 39 complaint term any fair trade allegation perfection Acceptance5 40 who can file complaint according to act dealer supplier customer magistrate5 41 defect can be defined as function deficiency perfection Compliance

5 42 unfair trade practice includes

false representation

compliance to prescribed standard

acceptance of goods

Service

5 43 refusal of goods determineoutput restraint on delivery

collusive tendering

false claim true claim

5 44 consumer protection act slogan isgrahak yojana jago grahak jago

consumer

awarnesscustomer

5 45 consumer forums consist district forum public forum

international forum

private forum

5 46 section 9(16-19) defines state comission jurisdictionnational comission

judge5 47 reliefs under CPA mention section-14 to 22 section-9 to 14 section-10 to 14 section-22 to 30

5 48 who is establish national comissionCentral

Governmentpublic magistrate lawyer

5 49 indian it act amendment release in 2002 2008 2000 1998

5 50 schedule 4 of indian it act describeamendments in penal code

amendments in indian evidence

bankers books of evidence

reserve bank of india