Intellectual Property Rights (IPR)
1. What is the primary purpose of intellectual property rights?
o A) To provide financial incentives for creators
o B) To encourage creativity and innovation
o C) To protect the economic rights of creators
o D) All of the above
o Correct Answer: D) All of the above
o Explanation: Intellectual property rights serve to provide financial incentives,
encourage creativity and innovation, and protect the economic rights of creators.
o Reference: Page 15, Section "Introduction to Intellectual Property"
2. Which type of IPR protects original works of authorship?
o A) Patent
o B) Trademark
o C) Copyright
o D) Trade Secret
o Correct Answer: C) Copyright
o Explanation: Copyrights protect original works of authorship, such as books,
music, and art.
o Reference: Page 20, Section "Copyrights"
3. What does a patent protect?
o A) Original works of authorship
o B) Brand names and logos
o C) Inventions and discoveries
o D) Confidential business information
o Correct Answer: C) Inventions and discoveries
o Explanation: Patents provide exclusive rights to inventors for their inventions
and discoveries.
o Reference: Page 30, Section "Patents"
4. Which IPR is used to distinguish products or services in the marketplace?
o A) Patent
o B) Trademark
o C) Copyright
o D) Trade Secret
o Correct Answer: B) Trademark
o Explanation: Trademarks are used to distinguish and identify the source of
products or services.
o Reference: Page 25, Section "Trademarks"
5. How long is a copyright typically valid?
o A) 10 years
o B) 20 years
o C) Life of the author plus 50 years
o D) Indefinitely
o Correct Answer: C) Life of the author plus 50 years
o Explanation: Copyright typically lasts for the life of the author plus an additional
50 years.
o Reference: Page 22, Section "Duration of Copyrights"
Computer Products and Services
6. Which of the following is considered a tangible computer product?
o A) Software
o B) Network configuration
o C) Printer
o D) Technical support
o Correct Answer: C) Printer
o Explanation: A printer is a physical, tangible product used with computers.
o Reference: Page 40, Section "Computer Products"
7. What type of software is typically pre-packaged and sold without modification?
o A) Custom software
o B) Off-the-shelf software
o C) Open-source software
o D) Modifiable software
o Correct Answer: B) Off-the-shelf software
o Explanation: Off-the-shelf software is pre-packaged and available for immediate
use without modification.
o Reference: Page 42, Section "Software as a Product"
8. Which of the following is an example of computer software being classified as a
service?
o A) Microsoft Office
o B) Adobe Photoshop
o C) Custom-built ERP systems
o D) Linux OS
o Correct Answer: C) Custom-built ERP systems
o Explanation: Custom-built ERP systems are tailored to meet specific client
needs, classifying them as a service.
o Reference: Page 43, Section "Software as a Service"
9. What legal protection is commonly used for software?
o A) Trademark
o B) Copyright
o C) Patent
o D) Trade Secret
o Correct Answer: B) Copyright
o Explanation: Software is typically protected by copyright laws.
o Reference: Page 44, Section "Legal Protection for Software"
10. When software allows for customization, it is often referred to as:
o A) Off-the-shelf software
o B) Custom software
o C) Modifiable software
o D) Open-source software
o Correct Answer: C) Modifiable software
o Explanation: Modifiable software allows for customization to meet specific user
needs.
o Reference: Page 45, Section "Customizable Software"
Copyrights
11. Which of the following is a step in obtaining a copyright?
o A) Filing an application with the patent office
o B) Submitting a copy of the work to the copyright office
o C) Registering a trademark
o D) Applying for a trade secret
o Correct Answer: B) Submitting a copy of the work to the copyright office
o Explanation: To obtain a copyright, a creator must submit a copy of the work to
the copyright office.
o Reference: Page 23, Section "Process of Obtaining Copyrights"
12. Copyrights protect:
o A) The idea itself
o B) The expression of the idea
o C) The manufacturing process
o D) Confidential information
o Correct Answer: B) The expression of the idea
o Explanation: Copyrights protect the expression of ideas, not the ideas
themselves.
o Reference: Page 21, Section "Scope of Copyrights"
13. Which of the following is NOT protected by copyright?
o A) Literary works
o B) Musical compositions
o C) Inventions
o D) Architectural designs
o Correct Answer: C) Inventions
o Explanation: Inventions are protected by patents, not copyrights.
o Reference: Page 21, Section "Scope of Copyrights"
14. What is the primary purpose of copyright law?
o A) To protect brand names
o B) To incentivize creation of original works
o C) To secure patents
o D) To safeguard trade secrets
o Correct Answer: B) To incentivize creation of original works
o Explanation: Copyright law aims to encourage the creation of original works by
providing legal protection to creators.
o Reference: Page 20, Section "Introduction to Copyrights"
15. Which of the following can be copyrighted?
o A) Business strategies
o B) Computer software
o C) Manufacturing processes
o D) Chemical formulas
o Correct Answer: B) Computer software
o Explanation: Computer software is considered a literary work and can be
copyrighted.
o Reference: Page 21, Section "Scope of Copyrights"
Patents
16. What is a requirement for an invention to be patentable?
o A) It must be published
o B) It must be new and useful
o C) It must be a literary work
o D) It must be a trademark
o Correct Answer: B) It must be new and useful
o Explanation: For an invention to be patentable, it must be new, useful, and non-
obvious.
o Reference: Page 31, Section "Criteria for Patentability"
17. Which of the following is NOT a criterion for patentability?
o A) Utility
o B) Novelty
o C) Nonobviousness
o D) Confidentiality
o Correct Answer: D) Confidentiality
o Explanation: Confidentiality is not a criterion for patentability; utility, novelty,
and non-obviousness are.
o Reference: Page 32, Section "Criteria for Patentability"
18. How long does a patent typically last?
o A) 10 years
o B) 20 years
o C) Life of the inventor plus 50 years
o D) Indefinitely
o Correct Answer: B) 20 years
o Explanation: A standard patent lasts for 20 years from the date of application.
o Reference: Page 34, Section "Duration of Patents"
19. Which of the following cannot be patented?
o A) A new machine
o B) A novel chemical process
o C) A mathematical formula
o D) An improved manufacturing process
o Correct Answer: C) A mathematical formula
o Explanation: Mathematical formulas cannot be patented; patents are for tangible
inventions and processes.
o Reference: Page 33, Section "Criteria for Patentability"
20. The primary benefit of obtaining a patent is:
o A) Protecting brand identity
o B) Securing exclusive rights to use, make, and sell the invention
o C) Preventing unauthorized copying of literary works
o D) Protecting trade secrets
o Correct Answer: B) Securing exclusive rights to use, make, and sell the
invention
o Explanation: Patents provide inventors with exclusive rights to their inventions,
allowing them to control their use and commercialization.
o Reference: Page 30, Section "Introduction to Patents"
Trade Secrets
21. What is the key characteristic of a trade secret?
o A) It is publicly disclosed
o B) It is patented
o C) It provides a competitive advantage
o D) It is trademarked
o Correct Answer: C) It provides a competitive advantage
o Explanation: Trade secrets are valuable because they provide a business with a
competitive edge.
o Reference: Page 35, Section "Introduction to Trade Secrets"
22. Trade secrets are protected for:
o A) 10 years
o B) 20 years
o C) The life of the owner
o D) Indefinitely, as long as secrecy is maintained
o Correct Answer: D) Indefinitely, as long as secrecy is maintained
o Explanation: Trade secrets can be protected indefinitely, provided the
information remains confidential.
o Reference: Page 37, Section "Duration of Trade Secrets"
23. Which of the following is an example of a trade secret?
o A) A published research paper
o B) A company's business strategy
o C) A registered trademark
o D) An expired patent
o Correct Answer: B) A company's business strategy
o Explanation: A business strategy that provides a competitive advantage and is
kept confidential can be a trade secret.
o Reference: Page 36, Section "Examples of Trade Secrets"
24. Legal action can be taken for trade secret misappropriation when:
o A) The secret is publicly disclosed
o B) The secret is independently discovered
o C) The secret is obtained through improper means
o D) The secret is registered with the patent office
o Correct Answer: C) The secret is obtained through improper means
o Explanation: Misappropriation occurs when trade secrets are acquired by
improper means, such as theft or breach of confidentiality.
o Reference: Page 38, Section "Legal Protection for Trade Secrets"
25. Which law primarily protects trade secrets?
o A) Copyright law
o B) Patent law
o C) Trademark law
o D) Trade secret law
o Correct Answer: D) Trade secret law
o Explanation: Trade secret law provides legal protection for confidential business
information that provides a competitive advantage.
o Reference: Page 39, Section "Legal Protection for Trade Secrets"
Trademarks
26. A trademark is primarily used to:
o A) Protect literary works
o B) Distinguish goods and services
o C) Secure patents
o D) Protect trade secrets
o Correct Answer: B) Distinguish goods and services
o Explanation: Trademarks help consumers identify and differentiate between
products and services in the marketplace.
o Reference: Page 25, Section "Introduction to Trademarks"
27. Which of the following can be trademarked?
o A) Inventions
o B) Literary works
o C) Brand names and logos
o D) Business strategies
o Correct Answer: C) Brand names and logos
o Explanation: Trademarks can include brand names, logos, and other symbols
used to identify goods and services.
o Reference: Page 26, Section "Categories of Trademarks"
28. How long is a trademark typically valid?
o A) 10 years, renewable
o B) 20 years, renewable
o C) Life of the author plus 50 years
o D) Indefinitely
o Correct Answer: A) 10 years, renewable
o Explanation: Trademarks are valid for 10 years and can be renewed indefinitely
as long as they are in use.
o Reference: Page 27, Section "Duration of Trademarks"
29. What is required for a mark to be registered as a trademark?
o A) It must be new and useful
o B) It must not cause confusion with existing marks
o C) It must be patented
o D) It must be copyrighted
o Correct Answer: B) It must not cause confusion with existing marks
o Explanation: A trademark must be distinctive and not cause confusion with
existing trademarks.
o Reference: Page 28, Section "Criteria for Trademark Registration"
30. Which category of trademarks is used for services rather than products?
o A) Service marks
o B) Certification marks
o C) Collective marks
o D) Trade secrets
o Correct Answer: A) Service marks
o Explanation: Service marks are used to identify and distinguish services rather
than products.
o Reference: Page 29, Section "Categories of Trademarks"
Intellectual Property Crimes
31. Which of the following is an example of intellectual property crime?
o A) Publishing a book
o B) Patenting an invention
o C) Counterfeiting branded products
o D) Trademark registration
o Correct Answer: C) Counterfeiting branded products
o Explanation: Counterfeiting involves producing imitation products to deceive
consumers and is considered an intellectual property crime.
o Reference: Page 50, Section "Types of Intellectual Property Crimes"
32. What is the primary consequence of intellectual property infringement?
o A) Increased innovation
o B) Economic losses for creators
o C) Legal protection for creators
o D) Enhanced public access to creations
o Correct Answer: B) Economic losses for creators
o Explanation: Infringement results in financial losses for the original creators and
can harm their economic interests.
o Reference: Page 52, Section "Consequences of Intellectual Property Crimes"
33. Which of the following actions constitutes piracy?
o A) Filing for a patent
o B) Distributing unauthorized copies of software
o C) Registering a trademark
o D) Securing a trade secret
o Correct Answer: B) Distributing unauthorized copies of software
o Explanation: Piracy involves the unauthorized reproduction and distribution of
copyrighted materials, such as software.
o Reference: Page 51, Section "Types of Intellectual Property Crimes"
34. Infringement of intellectual property rights can lead to:
o A) Criminal penalties
o B) Increased market share
o C) Enhanced brand recognition
o D) Public domain status
o Correct Answer: A) Criminal penalties
o Explanation: Violating intellectual property rights can result in criminal
penalties, including fines and imprisonment.
o Reference: Page 53, Section "Legal Consequences of IP Crimes"
35. Which type of intellectual property crime involves stealing business information?
o A) Counterfeiting
o B) Piracy
o C) Industrial espionage
o D) Trademark dilution
o Correct Answer: C) Industrial espionage
o Explanation: Industrial espionage involves the theft of confidential business
information and trade secrets.
o Reference: Page 54, Section "Types of Intellectual Property Crimes"
Computer Crimes
36. What is a computer virus?
o A) A harmless program
o B) A self-replicating program designed to alter or destroy data
o C) A program that does not spread
o D) A legal protection for software
o Correct Answer: B) A self-replicating program designed to alter or destroy
data
o Explanation: A computer virus is a type of malware that replicates itself and
spreads to other computers, causing damage.
o Reference: Page 60, Section "Computer Viruses"
37. Which of the following is a type of malware that disguises itself as legitimate
software?
o A) Virus
o B) Worm
o C) Trojan Horse
o D) Firewall
o Correct Answer: C) Trojan Horse
o Explanation: A Trojan Horse is a type of malware that appears to be legitimate
software but performs malicious actions.
o Reference: Page 62, Section "Types of Malware"
38. Which historical event marked the beginning of notable hacking activities?
o A) The invention of the telephone
o B) The release of "War Games" movie
o C) The development of ARPANET
o D) The formation of the 414-Club
o Correct Answer: D) The formation of the 414-Club
o Explanation: The 414-Club was one of the first hacking groups to gain national
attention for their activities.
o Reference: Page 65, Section "History of Hacking"
39. What is a key characteristic of worms?
o A) They attach to other programs
o B) They do not replicate
o C) They spread through networks
o D) They do not cause damage
o Correct Answer: C) They spread through networks
o Explanation: Worms are a type of malware that spread independently across
networks.
o Reference: Page 61, Section "Computer Worms"
40. Who is often credited with associating the term "computer virus" with a real-world
program?
o A) Alexander Graham Bell
o B) Fred Cohen
o C) Steven Levy
o D) Mark Zuckerberg
o Correct Answer: B) Fred Cohen
o Explanation: Fred Cohen is credited with defining the term "computer virus" in
the context of computer security.
o Reference: Page 63, Section "Computer Viruses"
Cyberbullying
41. Which of the following is a form of cyberbullying?
o A) Harassment
o B) Identity theft
o C) Copyright infringement
o D) Patent infringement
o Correct Answer: A) Harassment
o Explanation: Cyberbullying includes acts of harassment, such as sending
threatening or insulting messages online.
o Reference: Page 70, Section "Forms of Cyberbullying"
42. Cyberbullying often affects which groups the most?
o A) Elderly individuals
o B) School-age youth and white-collar workers
o C) Government officials
o D) Manual laborers
o Correct Answer: B) School-age youth and white-collar workers
o Explanation: School-age youth and white-collar workers are particularly
vulnerable to cyberbullying.
o Reference: Page 72, Section "Impact of Cyberbullying"
43. What is a common consequence of cyberbullying among youth?
o A) Increased academic performance
o B) Enhanced social skills
o C) Depression and anxiety
o D) Financial gain
o Correct Answer: C) Depression and anxiety
o Explanation: Victims of cyberbullying often experience emotional distress,
including depression and anxiety.
o Reference: Page 73, Section "Consequences of Cyberbullying"
44. Which workplace factor has contributed to the rise of cyberbullying?
o A) Limited use of technology
o B) Bring your own device (BYOD) policies
o C) Strict parental control
o D) Lack of curiosity among youth
o Correct Answer: B) Bring your own device (BYOD) policies
o Explanation: BYOD policies have increased the channels through which
employees can be bullied.
o Reference: Page 75, Section "Cyberbullying in the Workplace"
45. What is a recommended strategy for preventing cyberbullying?
o A) Encouraging anonymity online
o B) Developing massive education campaigns
o C) Reducing the use of social media
o D) Limiting technological advancements
o Correct Answer: B) Developing massive education campaigns
o Explanation: Education campaigns can raise awareness and teach effective
strategies for preventing cyberbullying.
o Reference: Page 77, Section "Strategies for Preventing Cyberbullying"
Computer Crime Prevention
46. Which of the following is a physical protective measure for computers?
o A) Encryption
o B) Cable-locking devices
o C) User passwords
o D) Software updates
o Correct Answer: B) Cable-locking devices
o Explanation: Physical security measures, such as cable-locking devices, help
prevent theft and unauthorized access.
o Reference: Page 80, Section "Physical Protective Measures"
47. What is a procedural measure to protect computer data?
o A) Installing antivirus software
o B) Encrypting data
o C) Using strong doors and locks
o D) Installing cable locks
o Correct Answer: B) Encrypting data
o Explanation: Encryption is a procedural measure that protects data by converting
it into a secure format.
o Reference: Page 82, Section "Procedural Protective Measures"
48. Which strategy helps to protect against malware?
o A) Using unauthorized disks
o B) Avoiding software updates
o C) Scanning downloaded files for viruses
o D) Disabling antivirus software
o Correct Answer: C) Scanning downloaded files for viruses
o Explanation: Regularly scanning downloaded files for viruses helps detect and
remove malware before it can cause harm.
o Reference: Page 84, Section "Strategies for Protecting Against Malware"
49. What is a key element of procedural protective measures?
o A) Physical locks
o B) Audit trails
o C) Anonymity
o D) Unrestricted access
o Correct Answer: B) Audit trails
o Explanation: Audit trails are used to track and record system access and
activities, enhancing security and accountability.
o Reference: Page 83, Section "Procedural Protective Measures"
50. What role does encryption play in computer security?
o A) Prevents physical theft
o B) Protects data from unauthorized access
o C) Allows for unrestricted access
o D) Disables audit trails
o Correct Answer: B) Protects data from unauthorized access
o Explanation: Encryption secures data by converting it into a format that can only
be read by authorized users.
o Reference: Page 82, Section "Procedural Protective Measures"
History of Computer Crimes
51. Who is credited with the early association of the term "computer virus"?
o A) Alexander Graham Bell
o B) Fred Cohen
o C) Steve Jobs
o D) Bill Gates
o Correct Answer: B) Fred Cohen
o Explanation: Fred Cohen is known for his work on computer viruses and for
coining the term in the context of computer security.
o Reference: Page 63, Section "History of Computer Viruses"
52. Which movie popularized the concept of hacking?
o A) The Matrix
o B) Hackers
o C) War Games
o D) The Net
o Correct Answer: C) War Games
o Explanation: The movie "War Games" introduced the general public to the
concept of hacking and its potential dangers.
o Reference: Page 66, Section "Hacking in Popular Culture"
53. The 414-Club is notable for:
o A) Developing the first antivirus software
o B) Being the first national news-making hacker group
o C) Creating the first computer virus
o D) Inventing the telephone network
o Correct Answer: B) Being the first national news-making hacker group
o Explanation: The 414-Club gained national attention for their hacking activities,
making them one of the first widely known hacker groups.
o Reference: Page 65, Section "Early Hacking Groups"
54. Which technology's invention is linked to the start of hacking?
o A) The telephone
o B) The personal computer
o C) The internet
o D) The transistor
o Correct Answer: A) The telephone
o Explanation: The invention of the telephone led to early forms of hacking, such
as phone phreaking.
o Reference: Page 64, Section "Origins of Hacking"
55. ARPANET is significant in the history of hacking because:
o A) It was the first personal computer
o B) It enabled the first networked computer attacks
o C) It was the first antivirus software
o D) It popularized computer viruses
o Correct Answer: B) It enabled the first networked computer attacks
o Explanation: ARPANET was an early network that provided the foundation for
the internet and facilitated some of the first networked computer attacks.
o Reference: Page 66, Section "Early Internet and Hacking"
Types of Computer System Attacks
56. Which type of attack involves unauthorized access to systems?
o A) Phishing
o B) Hacking
o C) Spam
o D) Social engineering
o Correct Answer: B) Hacking
o Explanation: Hacking involves gaining unauthorized access to computer
systems, often with malicious intent.
o Reference: Page 75, Section "Unauthorized Access"
57. What is phishing?
o A) Sending spam emails
o B) Unauthorized system access
o C) Fraudulently obtaining sensitive information
o D) Infecting computers with malware
o Correct Answer: C) Fraudulently obtaining sensitive information
o Explanation: Phishing involves tricking individuals into revealing sensitive
information, such as passwords or credit card numbers.
o Reference: Page 77, Section "Phishing Attacks"
58. Which attack spreads by duplicating itself across networks?
o A) Virus
o B) Worm
o C) Trojan Horse
o D) Phishing
o Correct Answer: B) Worm
o Explanation: Worms are malware that replicate themselves and spread across
networks without the need to attach to other programs.
o Reference: Page 76, Section "Worms"
59. What is a common goal of denial-of-service (DoS) attacks?
o A) To steal sensitive data
o B) To overload and crash systems
o C) To gain unauthorized access
o D) To install malware
o Correct Answer: B) To overload and crash systems
o Explanation: DoS attacks aim to disrupt the normal functioning of systems by
overwhelming them with traffic, causing them to crash.
o Reference: Page 78, Section "Denial-of-Service Attacks"
60. Which attack involves tricking users into revealing confidential information?
o A) Hacking
o B) Phishing
o C) Spamming
o D) Sniffing
o Correct Answer: B) Phishing
o Explanation: Phishing attacks deceive users into providing confidential
information by pretending to be a trustworthy entity.
o Reference: Page 77, Section "Phishing Attacks"
Cyber Harassment
61. Which term describes persistent and unwanted digital attention?
o A) Cyberbullying
o B) Cyber harassment
o C) Phishing
o D) Hacking
o Correct Answer: B) Cyber harassment
o Explanation: Cyber harassment refers to persistent and unwanted attention or
behavior online.
o Reference: Page 81, Section "Types of Cyber Harassment"
62. Which form of cyber harassment involves spreading false information?
o A) Harassment
o B) Denigration
o C) Impersonation
o D) Outing
o Correct Answer: B) Denigration
o Explanation: Denigration involves spreading false information to damage
someone's reputation.
o Reference: Page 82, Section "Forms of Cyber Harassment"
63. Cyber harassment in the workplace is often driven by:
o A) High self-esteem
o B) Lack of technological skills
o C) Bully’s internal shortcomings
o D) Excessive parental control
o Correct Answer: C) Bully’s internal shortcomings
o Explanation: Workplace cyber harassment often stems from the bully’s own
internal issues and need for control.
o Reference: Page 83, Section "Causes of Workplace Cyber Harassment"
64. What is a common effect of cyber harassment on victims?
o A) Improved social interaction
o B) Increased self-esteem
o C) Emotional distress
o D) Financial gain
o Correct Answer: C) Emotional distress
o Explanation: Victims of cyber harassment often experience emotional distress,
anxiety, and other negative psychological effects.
o Reference: Page 84, Section "Impact of Cyber Harassment"
65. Which strategy can help reduce cyber harassment?
o A) Encouraging anonymous online activity
o B) Developing company policies with behavioral guidelines
o C) Limiting the use of social media
o D) Promoting unrestricted access to digital devices
o Correct Answer: B) Developing company policies with behavioral guidelines
o Explanation: Establishing clear policies and guidelines can help create a safer
online environment and reduce instances of cyber harassment.
o Reference: Page 85, Section "Prevention of Cyber Harassment"
Protecting Computer Software
66. What is the primary challenge in protecting computer software?
o A) Lack of legal frameworks
o B) Difficulty in categorizing software
o C) High cost of development
o D) Limited technological advancements
o Correct Answer: B) Difficulty in categorizing software
o Explanation: The intangible nature of software makes it challenging to categorize
and protect through traditional legal frameworks.
o Reference: Page 90, Section "Challenges in Software Protection"
67. Software piracy involves:
o A) Legal distribution of software
o B) Copying and distributing proprietary software without authorization
o C) Registering software for copyright
o D) Developing open-source software
o Correct Answer: B) Copying and distributing proprietary software without
authorization
o Explanation: Software piracy is the unauthorized copying, distribution, and use
of software.
o Reference: Page 92, Section "Software Piracy"
68. Which of the following protects computer software as a literary work?
o A) Patent law
o B) Copyright law
o C) Trademark law
o D) Trade secret law
o Correct Answer: B) Copyright law
o Explanation: Copyright law treats computer software as a literary work,
providing protection for its code and structure.
o Reference: Page 91, Section "Legal Protection for Software"
69. What is a limitation of copyright protection for software?
o A) It cannot protect the source code
o B) It requires full disclosure of the software's functionality
o C) It is only valid for 10 years
o D) It cannot protect the software’s documentation
o Correct Answer: B) It requires full disclosure of the software's functionality
o Explanation: Copyright protection for software requires that the software's
functionality be disclosed, which can be a limitation.
o Reference: Page 92, Section "Limitations of Copyright for Software"
70. Under which circumstances can software be protected by patent law?
o A) When it is a literary work
o B) When it includes a unique algorithm
o C) When it has been registered as a trademark
o D) When it is considered a trade secret
o Correct Answer: B) When it includes a unique algorithm
o Explanation: Software that includes a unique algorithm or technological
innovation can be protected by patent law.
o Reference: Page 93, Section "Software Patents"
Ownership and Disclosure
71. An idea is considered novel if it is:
o A) Well-known and widely used
o B) Original, authentic, and new
o C) Kept secret from the public
o D) Legally protected by a trademark
o Correct Answer: B) Original, authentic, and new
o Explanation: A novel idea is one that is original, authentic, and new.
o Reference: Page 98, Section "Novelty in Intellectual Property"
72. Disclosure in the context of patents requires:
o A) Keeping the invention secret
o B) Publishing the invention for public use
o C) Adequate description of the invention for public and governmental review
o D) Protecting the invention indefinitely
o Correct Answer: C) Adequate description of the invention for public and
governmental review
o Explanation: Patent law requires that the invention be adequately described so
that it can be reviewed and understood by the public and government.
o Reference: Page 100, Section "Patent Disclosure Requirements"
73. The first sale doctrine allows a copyright owner to:
o A) Prevent others from using similar marks
o B) Distribute copies of the work by sale, transfer, or lease
o C) Keep the invention secret
o D) Patent the software
o Correct Answer: B) Distribute copies of the work by sale, transfer, or lease
o Explanation: The first sale doctrine allows the copyright owner to control the
initial sale of the work but not subsequent resales.
o Reference: Page 102, Section "First Sale Doctrine"
74. Fair use doctrine evaluates the use of copyrighted material based on:
o A) The nature of the invention
o B) The purpose, nature, percentage, and effect of the use
o C) The secrecy of the material
o D) The length of protection
o Correct Answer: B) The purpose, nature, percentage, and effect of the use
o Explanation: Fair use doctrine considers the purpose, nature, amount, and effect
of the use on the market value of the copyrighted work.
o Reference: Page 103, Section "Fair Use Doctrine"
75. Which of the following is a method to safeguard intellectual property rights?
o A) Publicizing trade secrets
o B) Collaborating with government officials to check on imports and exports
o C) Avoiding legal registration
o D) Disclosing all information to competitors
o Correct Answer: B) Collaborating with government officials to check on
imports and exports
o Explanation: Working with government officials helps prevent the import and
export of counterfeit goods.
o Reference: Page 105, Section "Safeguarding Intellectual Property"
Cyberstalking
76. Cyberstalking involves:
o A) Harmless online interaction
o B) Repeated, persistent, and often illegal digital stalking
o C) Physical harassment
o D) Legal monitoring of online activity
o Correct Answer: B) Repeated, persistent, and often illegal digital stalking
o Explanation: Cyberstalking is the repeated, persistent, and often illegal tracking
and harassment of an individual online.
o Reference: Page 110, Section "Definition of Cyberstalking"
77. A common characteristic of cyberstalking is:
o A) Legal acceptance
o B) Occasional, harmless messages
o C) Threatening and monitoring the victim
o D) Open communication with consent
o Correct Answer: C) Threatening and monitoring the victim
o Explanation: Cyberstalking often involves threatening behavior and continuous
monitoring of the victim's activities.
o Reference: Page 111, Section "Characteristics of Cyberstalking"
78. Cyberstalking differs from cyber harassment in that it:
o A) Is always legal
o B) Involves physical contact
o C) Includes extortion and identity theft
o D) Is limited to verbal abuse
o Correct Answer: C) Includes extortion and identity theft
o Explanation: Cyberstalking can include extortion, identity theft, and other
serious crimes beyond verbal abuse.
o Reference: Page 112, Section "Cyberstalking vs. Cyber Harassment"
79. A victim of cyberstalking may experience:
o A) Increased productivity
o B) Emotional trauma and fear
o C) Financial benefits
o D) Improved social interactions
o Correct Answer: B) Emotional trauma and fear
o Explanation: Victims of cyberstalking often suffer from emotional trauma,
anxiety, and fear.
o Reference: Page 113, Section "Impact of Cyberstalking"
80. Which of the following is a preventive measure against cyberstalking?
o A) Ignoring the problem
o B) Sharing personal information freely online
o C) Implementing strong privacy settings and reporting mechanisms
o D) Avoiding all forms of digital communication
o Correct Answer: C) Implementing strong privacy settings and reporting
mechanisms
o Explanation: Using strong privacy settings and having clear reporting
mechanisms can help prevent and address cyberstalking.
o Reference: Page 114, Section "Preventive Measures Against Cyberstalking"
Legal and Ethical Considerations
81. Which principle is crucial in balancing privacy and security?
o A) Full disclosure of all data
o B) Complete public access
o C) Ethical guidelines in cybersecurity
o D) Unlimited data collection
o Correct Answer: C) Ethical guidelines in cybersecurity
o Explanation: Ethical guidelines help balance the need for privacy with the
requirements of security in cybersecurity practices.
o Reference: Page 120, Section "Balancing Privacy and Security"
82. One of the main reasons for the lack of credible policies in computer crime
prevention is:
o A) Excessive data collection
o B) Inadequate reporting mechanisms and data analysis
o C) Over-reliance on manual processes
o D) High public awareness
o Correct Answer: B) Inadequate reporting mechanisms and data analysis
o Explanation: Inadequate reporting mechanisms and data analysis make it
difficult to develop effective policies for computer crime prevention.
o Reference: Page 122, Section "Challenges in Computer Crime Prevention"
83. Which of the following is an ethical responsibility in cybersecurity?
o A) Encouraging anonymous online activity
o B) Protecting the security of data and systems
o C) Ignoring potential threats
o D) Promoting unrestricted access to all information
o Correct Answer: B) Protecting the security of data and systems
o Explanation: Ensuring the security of data and systems is a key ethical
responsibility in cybersecurity.
o Reference: Page 121, Section "Ethical Responsibilities in Cybersecurity"
84. What is a common challenge in addressing cyber threats?
o A) Decreasing sophistication of malware
o B) Lack of global collaboration
o C) Overwhelming public trust
o D) Abundant resources and expertise
o Correct Answer: B) Lack of global collaboration
o Explanation: Addressing cyber threats effectively requires international
cooperation and collaboration.
o Reference: Page 123, Section "Global Collaboration in Cybersecurity"
85. Developing and adhering to ethical guidelines in cybersecurity helps in:
o A) Undermining public trust
o B) Ensuring responsible use of technology
o C) Reducing data protection
o D) Promoting unethical behavior
o Correct Answer: B) Ensuring responsible use of technology
o Explanation: Ethical guidelines help ensure the responsible use of technology
and maintain public trust.
o Reference: Page 124, Section "Importance of Ethical Guidelines"
Preventive Measures
86. Which of the following is a physical protective measure for computer security?
o A) Encryption
o B) Strong doors and locks
o C) Software updates
o D) Audit trails
o Correct Answer: B) Strong doors and locks
o Explanation: Physical security measures, such as strong doors and locks, help
prevent unauthorized physical access to computer systems.
o Reference: Page 130, Section "Physical Protective Measures"
87. What is a procedural measure for protecting computer systems?
o A) Using strong doors and locks
o B) Installing antivirus software
o C) Restricting access to computer facilities
o D) Encrypting data
o Correct Answer: D) Encrypting data
o Explanation: Encryption is a procedural measure that protects data by converting
it into a secure format.
o Reference: Page 132, Section "Procedural Protective Measures"
88. Which of the following helps protect against computer viruses?
o A) Disabling antivirus software
o B) Avoiding software updates
o C) Regularly scanning for viruses
o D) Ignoring security patches
o Correct Answer: C) Regularly scanning for viruses
o Explanation: Regularly scanning for viruses helps detect and remove malware
before it can cause harm.
o Reference: Page 134, Section "Strategies for Protecting Against Malware"
89. Which element is key in procedural protective measures?
o A) Unrestricted access
o B) Audit trails
o C) Physical locks
o D) Publicly sharing passwords
o Correct Answer: B) Audit trails
o Explanation: Audit trails track and record system access and activities,
enhancing security and accountability.
o Reference: Page 133, Section "Procedural Protective Measures"
90. Why is encryption important in computer security?
o A) It prevents physical theft
o B) It protects data from unauthorized access
o C) It allows for unrestricted access
o D) It disables audit trails
o Correct Answer: B) It protects data from unauthorized access
o Explanation: Encryption secures data by converting it into a format that can only
be read by authorized users.
o Reference: Page 132, Section "Importance of Encryption"
Computer Crime Prevention Strategies
91. What is a key strategy to reduce computer crime?
o A) Encouraging unrestricted access
o B) Aggressively enforcing computer crime laws
o C) Disabling security measures
o D) Promoting anonymous online activities
o Correct Answer: B) Aggressively enforcing computer crime laws
o Explanation: Strict enforcement of computer crime laws helps deter criminal
activities and protect information systems.
o Reference: Page 140, Section "Enforcement Strategies"
92. Moral education in computer ethics aims to:
o A) Encourage computer crimes
o B) Build character and guide actions
o C) Promote unauthorized access
o D) Ignore ethical considerations
o Correct Answer: B) Build character and guide actions
o Explanation: Moral education helps develop ethical behavior and guide
responsible actions in the use of technology.
o Reference: Page 142, Section "Role of Moral Education"
93. Which of the following describes a computer criminal?
o A) Someone with low technical skills
o B) Someone viewed as a hero challenging computers
o C) Someone who avoids technology
o D) Someone who promotes ethical behavior
o Correct Answer: B) Someone viewed as a hero challenging computers
o Explanation: Computer criminals are often seen as individuals who challenge
and exploit computer systems.
o Reference: Page 144, Section "Profile of a Computer Criminal"
94. What is a common motivation for computer criminals?
o A) Altruism
o B) Financial gain
o C) Promoting cybersecurity
o D) Public service
o Correct Answer: B) Financial gain
o Explanation: Financial gain is a common motivation for individuals engaging in
computer crimes.
o Reference: Page 145, Section "Motivations for Computer Crime"
95. Which of the following is a preventive measure for computer crime?
o A) Ignoring security patches
o B) Implementing strong access control mechanisms
o C) Disabling antivirus software
o D) Allowing unrestricted downloads
o Correct Answer: B) Implementing strong access control mechanisms
o Explanation: Strong access control mechanisms help restrict unauthorized access
to systems and data.
o Reference: Page 146, Section "Preventive Measures"
Effects of Cyberbullying
96. Which group is most affected by cyberbullying?
o A) Elderly individuals
o B) School-age youth
o C) Government officials
o D) Manual laborers
o Correct Answer: B) School-age youth
o Explanation: School-age youth are particularly vulnerable to the effects of
cyberbullying.
o Reference: Page 150, Section "Impact on Youth"
97. A common consequence of cyberbullying among victims is:
o A) Increased self-esteem
o B) Emotional distress and anxiety
o C) Improved academic performance
o D) Financial gain
o Correct Answer: B) Emotional distress and anxiety
o Explanation: Victims of cyberbullying often suffer from emotional distress,
anxiety, and other negative psychological effects.
o Reference: Page 152, Section "Psychological Impact"
98. Which factor contributes to the rise of cyberbullying in schools?
o A) Lack of parental control
o B) Limited use of technology
o C) High curiosity among youth
o D) Strong disciplinary measures
o Correct Answer: A) Lack of parental control
o Explanation: Lack of parental control and monitoring can contribute to the rise of
cyberbullying among students.
o Reference: Page 153, Section "Contributing Factors"
99. What is a recommended strategy for addressing cyberbullying?
o A) Promoting anonymity online
o B) Developing massive education campaigns
o C) Limiting social media use
o D) Avoiding technological advancements
o Correct Answer: B) Developing massive education campaigns
o Explanation: Education campaigns can raise awareness and teach effective
strategies for preventing and addressing cyberbullying.
o Reference: Page 154, Section "Preventive Strategies"
100. Which workplace factor has increased the channels for cyberbullying? - A)
Strict supervision - B) Use of personal digital devices (BYOD) - C) Limited online
interactions - D) Strong parental guidance - Correct Answer: B) Use of personal digital
devices (BYOD) - Explanation: BYOD policies have increased the channels through
which employees can be bullied in the workplace. - Reference: Page 155, Section
"Workplace Cyberbullying"