T4Tutorials .PK

NSCT – Cyber Laws & Ethics MCQs

1. . Cyber Laws are:

(A) Guidelines for deleting files


(B) Rules to increase internet speed


(C) Legal regulations governing the use of computers, internet, and digital technologies


(D) Instructions to compress data




2. . Cyber Ethics refers to:

(A) Compressing data


(B) Encrypting files


(C) Moral principles and behavior in the use of digital technologies


(D) Deleting old emails




3. . Which of the following is considered a cybercrime?

(A) Hacking into systems


(B) Phishing


(C) Identity theft


(D) All of the above




4. . The main objective of cyber laws is to:

(A) Delete old emails


(B) Increase storage capacity


(C) Compress files


(D) Protect users, organizations, and data from illegal activities




5. . Intellectual Property Rights (IPR) in cyberspace protect:

(A) Files automatically


(B) Only hardware


(C) Only network cables


(D) Software, digital content, and inventions




6. . The Information Technology Act, 2000 (India) deals with:

(A) Only data compression


(B) Legal recognition of electronic documents, digital signatures, and cybercrime


(C) Increasing internet speed


(D) Deleting malware




7. . Phishing is:

(A) Attempting to steal sensitive information by pretending to be a trusted entity


(B) Encrypting emails


(C) Compressing attachments


(D) Deleting spam automatically




8. . Cyberstalking refers to:

(A) Encrypting data


(B) Using the internet to harass or threaten someone


(C) Deleting old accounts


(D) Compressing files




9. . Data privacy laws aim to:

(A) Increase network speed


(B) Delete old files


(C) Protect personal and sensitive information of individuals


(D) Compress logs




10. . Digital signatures are used to:

(A) Delete data


(B) Encrypt files automatically


(C) Verify authenticity and integrity of electronic documents


(D) Compress messages




11. . Cyber terrorism involves:

(A) Compressing data


(B) Encrypting emails


(C) Deleting malware


(D) Using digital technologies to conduct politically motivated attacks or threats




12. . Password theft is illegal under cyber laws because it:

(A) Deletes old emails


(B) Compresses files automatically


(C) Enables unauthorized access to systems or data


(D) Increases internet speed




13. . Online piracy refers to:

(A) Compressing logs


(B) Encrypting files


(C) Illegal copying and distribution of copyrighted digital content


(D) Deleting old data




14. . Cyberbullying is:

(A) Using digital platforms to intimidate, threaten, or harm others


(B) Encrypting files


(C) Compressing messages


(D) Deleting old accounts




15. . Ethics in social media usage include:

(A) Increasing likes


(B) Deleting old posts automatically


(C) Compressing media


(D) Respecting privacy, avoiding fake news, and proper online conduct




16. . Computer fraud is:

(A) Using digital systems to deceive or manipulate for financial gain


(B) Encrypting emails


(C) Compressing files


(D) Deleting old data




17. . Cyber laws ensure accountability for:

(A) Deleting old files


(B) Compressing files


(C) Increasing system speed


(D) Actions taken online that harm others or break legal regulations




18. . Key principles of cyber ethics include:

(A) Deleting old emails


(B) Compressing files


(C) Honesty, integrity, privacy, and respect for others


(D) Encrypting data automatically




19. . Unauthorized access to government or corporate systems is:

(A) Only a social issue


(B) Allowed if done ethically


(C) Compressed automatically


(D) Illegal under most cyber laws




20. . The main objective of Cyber Laws & Ethics is to:

(A) Compress data


(B) Promote responsible, legal, and ethical use of technology while protecting users and data


(C) Delete old files


(D) Increase system speed




Exit mobile version