You are on page 1of 2

JANA BHAWANA CAMPUS

Godawari-11, Lalitpur
Mid-Term Exam- 2080
Bachelor/Humanities/BCA -VII Name :- ____________________
Cyber Law and Professional Ethics Roll No :- ____________________

Group A
Multiple Choice Questions (10×1 = 10)
Write the correct answer:
1. Which of the following is a disadvantage of proprietary software?
a. You need to be an expert to edit code
b. It's often free
c. You have to pay for this type of software
d. You can edit the source code to customize it
2. Which of the following is considered unauthorized access?
a. Hacking financial account
b. Stealing organizational information
c. Illegally monitoring of information and illegal user of login and password of the users
d. All of the above
3. The hackers whose main motive is to gain financial profit by doing cybercrimes are called…
a. White hat hackers c. Black hat hackers
b. Hacktivists d. Gray hat hackers
4. Which one is NOT an implementation level of CIA triad?
a. Implementing CIA at the organization level c. Implementing CIA at the network level
b. Implementing CIA at the application level d. Implementing CIA at the Vendor level
5. Cyber-loafing is defined as
a. Chatting with coworkers
b. Using internet for purposed unrelated to work
c. Destroying IT asset of a company
d. Spreading fake news online
6. Stuxnet is a …………..
a. Worm b. Virus c. Trojan d. Antivirus
7. What is NOT true for Open-source Software?
a. The source code is publicly available c. It does not have license
b. It can be used by anyone d. It is freely available
8. Which of the following refers to stealing one's idea or invention of others and use it for their own benefits?
a. Piracy b. Plagiarism
b. Intellectual property rights d. All of the above
9. When we say that the ABC organization is CMMI level 5 company, we describe its stage by…..
a. Defined c. Optimized
b. Managed d. Quantitatively managed
10. The Onshore Software Outsourcing and Offshore Software Outsourcing are the ……… for software outsourcing?
a. Models c. Systems
b. Schemes d. None of the above
JANA BHAWANA CAMPUS
Godawari-11, Lalitpur
Mid-Term Exam- 2080
Bachelor/Humanities/BCA -VII F. M. 60
Cyber Law and Professional Ethics P.M. 30

Group B
Short Answer Questions (6 × 5 = 30)
Attempt any SIX questions.
1. What do you think are the reasons behind increased usage of pirated software in Nepal?
2. What is phishing? Why is it popular among attackers? What are the measures on should take to prevent this
attack? (1+1+3)
3. Write about business application of social media. What are the ethical issues associated with social media
marketing? (2+3)
4. What is reverse engineering? Why it has taken as an issue of intellectual property? (3+2)
5. Differentiate between Offshoring and Outsourcing.
6. Explain the major provisions of Nepal's cyber law.
7. Write short notes on (Any Two): (2 × 2.5 = 5)
a. John Doe Lawsuits
b. Advanced Persistent Threat (APT)
c. Cybersquatting

Group C
Long Answer Questions (2 × 10 = 20)
Attempt only TWO questions.
1. What do you mean by cyberstalking? Explain how you protect yourself from cyber-stalkers. Differentiate between
cyberstalking and cyberbullying. (2+4+4)
2. Define Intellectual Property. Describe any four types of intellectual properties. (2+8)
3. What is software quality? Elaborate any four strategies that a software developer needs to implement for
developing good quality software. (2+8)

You might also like