Internet Safety and Copyright Law Quiz
48 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which of the following is NOT a mode of entertainment available on the internet?

  • Online Television
  • Songs
  • Online Shopping (correct)
  • Online Games
  • What is a potential risk when sharing personal information online?

  • Speed of internet connection may be reduced
  • Increased electrical bill
  • Inability to access certain websites
  • Loss of personal information (correct)
  • Which characteristic is NOT associated with a computer?

  • Storage and retrieval of large amounts of data
  • Execution of a pre-recorded list of instructions
  • Ability to act independently of instructions (correct)
  • Ability to manipulate symbols
  • What is spamming primarily related to?

    <p>Receiving unwanted e-mails in bulk (D)</p> Signup and view all the answers

    What constitutes the physical components of a computer?

    <p>Hardware (C)</p> Signup and view all the answers

    Which of the following services is an example of electronic commerce?

    <p>Conducting business deals online (B)</p> Signup and view all the answers

    What is a significant concern regarding children's use of the internet?

    <p>Access to pornographic content (A)</p> Signup and view all the answers

    Which of the following is a reason to use credit cards only on authenticated sites?

    <p>To prevent loss of personal information (C)</p> Signup and view all the answers

    What is the primary civil remedy available to copyright owners for infringement?

    <p>Interlocutory Injunctions (B)</p> Signup and view all the answers

    Under Section 63 of The Copyright Act, 1957, what is the minimum imprisonment term for copyright infringement?

    <p>Six months (A)</p> Signup and view all the answers

    Which type of civil remedy allows for the seizure of infringing goods?

    <p>Anton Piller Orders (B)</p> Signup and view all the answers

    What is the maximum fine under Section 63 of The Copyright Act for copyright infringement?

    <p>Rs. 200,000 (B)</p> Signup and view all the answers

    In criminal proceedings for copyright infringement, what must an infringer prove to avoid penalties?

    <p>He was unaware of the copyright (C)</p> Signup and view all the answers

    What role do police officers have in the enforcement of copyright law under Section 63?

    <p>Seizing infringing copies without a warrant (B)</p> Signup and view all the answers

    Which of the following is NOT a type of civil remedy mentioned in copyright law?

    <p>Restitution of rights (A)</p> Signup and view all the answers

    What does the term 'rendition of accounts' refer to in copyright civil remedies?

    <p>Accountability of profits made from infringing copies (C)</p> Signup and view all the answers

    What is a significant disadvantage of e-commerce related to customer interaction?

    <p>Limited customer service options are available. (D)</p> Signup and view all the answers

    Which e-commerce model involves transactions solely between companies?

    <p>Business to Business (B)</p> Signup and view all the answers

    What is a common limitation of online shopping when comparing the product received to expectations?

    <p>Online images may not accurately represent the product. (B)</p> Signup and view all the answers

    In which e-commerce model do consumers sell goods directly to each other?

    <p>Consumer to Consumer (D)</p> Signup and view all the answers

    Which of the following is an advantage that retailers like Amazon provide to ease the waiting period for online purchases?

    <p>Same-day delivery as a premium option. (B)</p> Signup and view all the answers

    What scenario describes the Consumer to Business e-commerce model?

    <p>A consumer provides a service to a company. (B)</p> Signup and view all the answers

    Which type of e-commerce primarily focuses on selling products directly to consumers?

    <p>Business to Consumer (A)</p> Signup and view all the answers

    What is a notable challenge of online shopping regarding product satisfaction?

    <p>Inability to touch or try products before purchase. (A)</p> Signup and view all the answers

    What happens to data in volatile memory when the computing device is turned off?

    <p>It is automatically deleted. (D)</p> Signup and view all the answers

    Which type of memory allows for immediate access by the processor?

    <p>Cache memory (B)</p> Signup and view all the answers

    Which type of primary memory requires periodic refreshing to retain data?

    <p>Dynamic RAM (A)</p> Signup and view all the answers

    What is the primary role of primary memory in a computing device?

    <p>To store data and instructions temporarily for fast access. (D)</p> Signup and view all the answers

    What distinguishes SRAM from DRAM?

    <p>SRAM retains data as long as power is supplied; DRAM needs refreshing. (C)</p> Signup and view all the answers

    Which memory type is integrated directly into the CPU chip?

    <p>Cache memory (A)</p> Signup and view all the answers

    What characteristic defines semiconductor memory?

    <p>It uses silicon-based metal-oxide-semiconductor transistors. (B)</p> Signup and view all the answers

    Which of the following is a characteristic of DDR SDRAM?

    <p>It improves memory clock speed theoretically to at least 200 MHz. (B)</p> Signup and view all the answers

    What is the status of an offer once it reaches the knowledge of the offeree?

    <p>The offeror can revoke it at any time. (C)</p> Signup and view all the answers

    When is acceptance of a contract said to occur under the postal acceptance rule?

    <p>When acceptance is posted. (B)</p> Signup and view all the answers

    Which case exemplifies the principle of communication of acceptance?

    <p>Lalman Shukla v. Gaurie Datta Sharma (B)</p> Signup and view all the answers

    What must occur for a contract to be considered concluded?

    <p>Acceptance must mirror the offer. (D)</p> Signup and view all the answers

    What is a limitation of the Information Technology Act of 2000 in relation to electronic contracts?

    <p>It complements the Indian Contract Act but is not comprehensive. (A)</p> Signup and view all the answers

    What happens if the acceptance of an offer varies from the original terms?

    <p>It constitutes a counter proposal. (C)</p> Signup and view all the answers

    How does the dispatch and receipt of emails affect the revocation of offers?

    <p>They shorten the time frame for communication. (C)</p> Signup and view all the answers

    Which of the following accurately reflects the relationship between the Indian Contract Act and the Information Technology Act?

    <p>The Indian Contract Act still applies to electronic contracts. (A)</p> Signup and view all the answers

    What must an officer do after arresting a person under Section 80 (2) of the IT Act?

    <p>Take or send the person before a magistrate or police officer without unreasonable delay (D)</p> Signup and view all the answers

    What is the purpose of the online cyber-crime reporting portal launched by the Government of India?

    <p>To allow citizens to lodge complaints related to cyber crimes, especially involving children (B)</p> Signup and view all the answers

    Which component is NOT part of the Indian Cyber Crime Coordination Centre (I4C)?

    <p>National Cybersecurity Policy Office (D)</p> Signup and view all the answers

    How can a complainant take action if they do not receive an appropriate response after filing a cybercrime complaint?

    <p>Write to State/UT Nodal Officer and Grievance Officer (D)</p> Signup and view all the answers

    What is the new feature introduced for reporting Cyber Financial Fraud in Delhi?

    <p>Citizen Financial Cyber Fraud Reporting and Management System (B)</p> Signup and view all the answers

    Where can one report a cyber-crime online?

    <p><a href="http://www.cybercrime.gov.in/Accept.aspx">www.cybercrime.gov.in/Accept.aspx</a> (D)</p> Signup and view all the answers

    What is one method NOT mentioned for reporting a cyber-crime?

    <p>Contacting online chat support on the portal (C)</p> Signup and view all the answers

    What is the main focus of the Indian Cyber Crime Coordination Centre (I4C)?

    <p>To handle cybercrime incidents in an inclusive and coordinated manner (A)</p> Signup and view all the answers

    Flashcards

    What is a computer?

    A computer is a programmable machine that can manipulate symbols. It follows pre-defined instructions and can quickly store and retrieve large amounts of data.

    Internet Banking

    Internet banking lets you manage your accounts online, including transfers and payments. You can do it anytime from any device with access.

    E-commerce

    E-commerce is buying and selling goods or services online through electronic systems. This covers websites, apps, and digital transactions.

    Spamming

    Unwanted, unsolicited emails sent in bulk are called spam. They can clog your inbox and may be malicious.

    Signup and view all the flashcards

    Viruses

    Harmful software that can damage your computer or steal your data. They spread through downloads or attachments.

    Signup and view all the flashcards

    Online information security

    Sharing sensitive data online like passwords, credit card information, or addresses requires caution. Only use secure websites and be aware of phishing attempts.

    Signup and view all the flashcards

    Internet Entertainment

    Online games, streaming services, social media, and music are all examples of online entertainment.

    Signup and view all the flashcards

    Hardware

    The tangible parts of a computer, such as the keyboard, monitor, and internal components.

    Signup and view all the flashcards

    Primary Memory (RAM)

    The faster, more accessible type of memory that a computer uses to store active programs and data.

    Signup and view all the flashcards

    Secondary Memory

    The slower, more permanent storage that holds programs and files when the computer is off.

    Signup and view all the flashcards

    Cache Memory

    A small, fast memory that the CPU uses to access frequently used data, speeding up operations.

    Signup and view all the flashcards

    Random Access Memory (RAM)

    A type of primary memory where each memory location can be directly accessed by the processor.

    Signup and view all the flashcards

    Dynamic RAM (DRAM)

    A kind of RAM that uses capacitors and transistors to store data, and requires periodic refreshing to keep the data.

    Signup and view all the flashcards

    Static RAM (SRAM)

    A type of RAM that uses transistors and doesn't need constant refreshing, making it faster than DRAM.

    Signup and view all the flashcards

    Double Data Rate SDRAM (DDR SDRAM)

    A type of DRAM that improves memory clock speed by allowing data transfer on both rising and falling edges of the clock signal.

    Signup and view all the flashcards

    Double Data Rate 4 Synchronous Dynamic RAM (DDR4 SDRAM)

    A type of DDR SDRAM that further increases memory speed and efficiency.

    Signup and view all the flashcards

    Interlocutory injunction

    A legal order from a court that stops someone from doing something, especially infringing on copyright.

    Signup and view all the flashcards

    Pecuniary remedies

    Financial compensation awarded to the copyright holder for the losses caused by the infringement.

    Signup and view all the flashcards

    Anton Piller order

    A court order granting permission to search and seize evidence related to copyright infringement.

    Signup and view all the flashcards

    Mareva injunction

    A court order freezing assets of someone suspected of copyright infringement to prevent them from transferring or disposing of them.

    Signup and view all the flashcards

    Norwich Pharmacal order

    A court order requiring someone to disclose information relevant to identifying an infringer or the source of infringing materials.

    Signup and view all the flashcards

    Imprisonment for copyright infringement

    A legal punishment that involves time spent in prison for copyright infringement.

    Signup and view all the flashcards

    Fines for copyright infringement

    A set amount of money that must be paid as a penalty for copyright infringement.

    Signup and view all the flashcards

    Search and seizure of infringing goods

    The seizure of any materials used to create or distribute infringing copies, such as printing plates or digital files.

    Signup and view all the flashcards

    Business-to-Consumer (B2C) E-commerce

    Businesses selling goods directly to consumers online, offering browsing, ordering, and delivery. Examples include Amazon, Flipkart, and Jabong.

    Signup and view all the flashcards

    Consumer-to-Consumer (C2C) E-commerce

    Consumers selling goods or assets directly to other consumers, eliminating company involvement. Examples include OLX and Quikr.

    Signup and view all the flashcards

    Business-to-Business (B2B) E-commerce

    Businesses providing goods or services to other businesses, with no direct consumer involvement. Examples include online wholesale marketplaces and B2B software providers.

    Signup and view all the flashcards

    Consumer-to-Business (C2B) E-commerce

    Consumers providing goods or services to businesses, often by offering freelance work, skills, or products. Examples include platforms for creative workers or online service providers.

    Signup and view all the flashcards

    Inability to touch products

    The difficulty in physically examining products before purchase, leading to potential dissatisfaction with quality or fit.

    Signup and view all the flashcards

    Limited customer service

    The challenge of providing immediate customer support or product demonstrations online.

    Signup and view all the flashcards

    Lack of instant gratification

    The wait for delivery after online purchases, although expedited options are available for some items.

    Signup and view all the flashcards

    Types of E-commerce Models

    The various types of e-commerce models, classified based on the parties involved in transactions.

    Signup and view all the flashcards

    Offer Communication

    An offer is complete when the recipient is aware of it. This is the point at which they can accept it.

    Signup and view all the flashcards

    Offer Revocation

    An offeror can withdraw their proposal before an acceptance is confirmed.

    Signup and view all the flashcards

    Mirror Image Rule

    When an acceptance matches the offer perfectly, a contract is formed.

    Signup and view all the flashcards

    Postal Acceptance Rule

    The acceptance of an offer is considered complete when it is sent, not when received by the offeror.

    Signup and view all the flashcards

    Electronic Acceptance

    Electronic acceptance is complete when it enters the specified computer system of the offeror.

    Signup and view all the flashcards

    Revocation of an Offer

    The act of removing an offer before it has been accepted.

    Signup and view all the flashcards

    Electronic Contract Law

    Both the Indian Contract Act and Information Technology Act apply to electronic contracts, but the time lag in electronic communication means the traditional Section 5 of the Indian Contract Act on revocation doesn't always apply.

    Signup and view all the flashcards

    Counter Offer

    A counter-offer is a response that changes the terms of the original offer, effectively rejecting the previous offer and creating a new one.

    Signup and view all the flashcards

    Cybercrime Reporting Portal

    A government-run platform for reporting various cybercrimes like child pornography, sexually explicit material, and other online criminal activities.

    Signup and view all the flashcards

    Indian Cyber Crime Coordination Centre (I4C)

    A comprehensive plan by the Indian government to combat cybercrime by establishing specialized units and coordinating actions.

    Signup and view all the flashcards

    National Cybercrime Threat Analytics Unit (TAU)

    A dedicated unit within the I4C focused on analyzing cybercrime trends and threats.

    Signup and view all the flashcards

    National Cybercrime Forensic Laboratory (NCFL)

    A specialized lab within the I4C that investigates and examines digital evidence in cybercrime cases.

    Signup and view all the flashcards

    National Cybercrime Training Centre (NCTC)

    A unit within the I4C that trains law enforcement and other professionals in combating cybercrime.

    Signup and view all the flashcards

    Platform for Joint Cybercrime Investigation Team

    A mechanism to enhance collaboration between different agencies involved in cybercrime investigations.

    Signup and view all the flashcards

    Citizen Financial Cyber Fraud Reporting and Management System

    A system for reporting financial cyber fraud incidents in Delhi, allowing for swift intervention and potentially preventing financial losses.

    Signup and view all the flashcards

    Lodging an F.I.R (First Information Report)

    The act of filing a formal report with the police about a crime.

    Signup and view all the flashcards

    Study Notes

    Cyber Law

    • Cyber Law is a body of law that governs the use of computers and the internet, encompassing issues like cybercrime, intellectual property, and e-commerce.
    • The compilation of study materials is prepared by Karthik Anand, Assistant Professor of Law at SDM Law College, Mangalore.

    Overview of Computer and Web

    • Internet: A global system of interconnected computer networks using the TCP/IP protocol.
    • IP Address: A unique numerical identifier for every computer on the internet.
    • DNS (Domain Name Server): Translates human-readable names (e.g., www.example.com) to IP addresses.
    • Internet accessibility: Internet access is globally available.

    Evolution of the Internet

    • ARPANET (Advanced Research Projects Agency Network): Developed by the US Department of Defense to provide communication among various government bodies. Originated in 1969.
    • Expansion: The initial four nodes expanded globally to 23 nodes by 1972, marking the evolution to the Internet.
    • Technological advancements: TCP/IP protocols, DNS, WWW, browsers, and scripting languages facilitated the publication and access of information through the web.

    Use of Internet

    • Communication: Facilitates communication with remote persons through various applications. Social networking sites such as Facebook, Twitter, Yahoo, Google+, Flickr,and Orkut are examples.
    • Information: Access to various types of information like technology, health, science, social studies, geographical information, information technology, and product information.
    • Entertainment: The internet is a medium of entertainment, including online television, online games, songs, and videos.
    • Services: The internet offers services like online banking, matrimonial services, online shopping, online ticket booking, online bill payment, and data sharing.

    Computer: Definition and Characteristics

    • A computer: A programmable machine for manipulating symbols.
    • Characteristics: Responds to specific instructions, executes prerecorded instructions, stores and retrieves vast amounts of data.

    Computer Component:

    • CPU (Central Processing Unit): Executes instructions.
    • Memory: Stores data temporarily; fast but expensive (e.g., RAM). Permanent but slower forms of storage (e.g., hard drives, solid-state drives).
    • Input Device (e.g., keyboard, mouse): Enters instructions into the computer.
    • Output Device (e.g., monitor, printer): Displays the results of processing to the user.

    Risks and Challenges of Internet

    • Personal information loss: Risk of losing personal information like names, addresses, credit card numbers.
    • Spamming: Unwanted bulk emails cause disruptions.
    • Virus attacks: Viruses can spread to connected computers causing crashes.
    • Online Pornography: Exposure (especially to children) is a significant problem. 

    Unit 2 - Cyber Law and IPR

    • Legal framework:Copyright Act, Trade and Merchandise Marks Act, Patents Act, and Designs Act primarily based on English law, are the key regulations governing Intellectual Property (IP) on the internet. Major changes expected to comply with International agreements (TRIPS/WTO).
    • Intellectual Property (IP): Encompasses various types of creative works, inventions, and expressions, such as patents, copyrights, trademarks, trade secrets, and geographical indications.

    Unit 3 - Electronic Commerce

    • Definition: E-commerce is the process of conducting business transactions over the internet encompassing business-to-business, business-to-consumer, consumer-to-consumer, and consumer-to-business transactions.
    • Advantages: Convenience, increased selection, cheaper product access, and wider global reach.
    • Disadvantages: Limited customer service, lack of instant gratification, inability to physically see products, and security concerns.

    Unit 4 - Cybercrimes

    • Definition: Criminal activities that target or utilise computer systems, networks, or devices. Categorized into activities that target and activities that use computers.
    • Types: Email and internet fraud, identity fraud, theft of financial or card payment data, theft and sale of corporate data, cyberextortion, ransomware attacks, cryptojacking, cyberespionage, and cyber terrorism.
    • Cybercrime prevention: Security awareness, using anti-virus software,  and creating strong passwords. 

    Unit 5 - Amendment to the IT Act

    • History: The 2000 Act was based on the Model Law on Electronic Commerce (based on the UNCITRAL Model Law).
    • The Act (and subsequent Amendments) provided methods of legal recognition for electronic transactions.
    • The amendment provided legal recognition to electronic records and digital signatures.
    • The amendment also created new rules and regulations related to e-commerce, particularly for protecting user data.

    General Notes

    • Presented are an overview of the detailed study materials for Cyber Law concepts. The materials cover details on the different aspects related to the topic.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Related Documents

    Description

    Test your knowledge on internet safety threats and copyright laws with this engaging quiz. Explore topics such as online entertainment, risks of sharing personal information, and the implications of copyright infringement under the Copyright Act, 1957. Challenge yourself and improve your understanding of digital rights and responsibilities.

    More Like This

    Internet Safety Quiz
    10 questions
    Internet Safety for Teens
    3 questions

    Internet Safety for Teens

    TopQualityRainbowObsidian avatar
    TopQualityRainbowObsidian
    Internet Browsers and Safety
    14 questions
    Use Quizgecko on...
    Browser
    Browser