1. . Cyber Laws are:
(A) Guidelines for deleting files
(B) Rules to increase internet speed
(C) Legal regulations governing the use of computers, internet, and digital technologies
(D) Instructions to compress data
2. . Cyber Ethics refers to:
(A) Compressing data
(B) Encrypting files
(C) Moral principles and behavior in the use of digital technologies
(D) Deleting old emails
3. . Which of the following is considered a cybercrime?
(A) Hacking into systems
(B) Phishing
(C) Identity theft
(D) All of the above
4. . The main objective of cyber laws is to:
(A) Delete old emails
(B) Increase storage capacity
(C) Compress files
(D) Protect users, organizations, and data from illegal activities
5. . Intellectual Property Rights (IPR) in cyberspace protect:
(A) Files automatically
(B) Only hardware
(C) Only network cables
(D) Software, digital content, and inventions
6. . The Information Technology Act, 2000 (India) deals with:
(A) Only data compression
(B) Legal recognition of electronic documents, digital signatures, and cybercrime
(C) Increasing internet speed
(D) Deleting malware
7. . Phishing is:
(A) Attempting to steal sensitive information by pretending to be a trusted entity
(B) Encrypting emails
(C) Compressing attachments
(D) Deleting spam automatically
8. . Cyberstalking refers to:
(A) Encrypting data
(B) Using the internet to harass or threaten someone
(C) Deleting old accounts
(D) Compressing files
9. . Data privacy laws aim to:
(A) Increase network speed
(B) Delete old files
(C) Protect personal and sensitive information of individuals
(D) Compress logs
10. . Digital signatures are used to:
(A) Delete data
(B) Encrypt files automatically
(C) Verify authenticity and integrity of electronic documents
(D) Compress messages
11. . Cyber terrorism involves:
(A) Compressing data
(B) Encrypting emails
(C) Deleting malware
(D) Using digital technologies to conduct politically motivated attacks or threats
12. . Password theft is illegal under cyber laws because it:
(A) Deletes old emails
(B) Compresses files automatically
(C) Enables unauthorized access to systems or data
(D) Increases internet speed
13. . Online piracy refers to:
(A) Compressing logs
(B) Encrypting files
(C) Illegal copying and distribution of copyrighted digital content
(D) Deleting old data
14. . Cyberbullying is:
(A) Using digital platforms to intimidate, threaten, or harm others
(B) Encrypting files
(C) Compressing messages
(D) Deleting old accounts
15. . Ethics in social media usage include:
(A) Increasing likes
(B) Deleting old posts automatically
(C) Compressing media
(D) Respecting privacy, avoiding fake news, and proper online conduct
16. . Computer fraud is:
(A) Using digital systems to deceive or manipulate for financial gain
(B) Encrypting emails
(C) Compressing files
(D) Deleting old data
17. . Cyber laws ensure accountability for:
(A) Deleting old files
(B) Compressing files
(C) Increasing system speed
(D) Actions taken online that harm others or break legal regulations
18. . Key principles of cyber ethics include:
(A) Deleting old emails
(B) Compressing files
(C) Honesty, integrity, privacy, and respect for others
(D) Encrypting data automatically
19. . Unauthorized access to government or corporate systems is:
(A) Only a social issue
(B) Allowed if done ethically
(C) Compressed automatically
(D) Illegal under most cyber laws
20. . The main objective of Cyber Laws & Ethics is to:
(A) Compress data
(B) Promote responsible, legal, and ethical use of technology while protecting users and data
(C) Delete old files
(D) Increase system speed