What is Cyber-law?

0
Cyber law is a generic term which refers to all the legal and regular aspects of internet and the World Wide Web. Anything concerned with or related to or emanating from any legal aspects or issues concerning any activity of citizens and others, in cyberspace comes within the ambit of cyclone. In short term it can be says that "cyberspace is governed by a system of law and regulation called cyber law".


The term "cyberspace" was first used way back in 1984 by author William Gibson in his scientific novel Neuromancer to describe virtual world of computers. Today, cyberspace is how most people describe the word of the Net. The growth of Electronic Commerce has fuelled the need for vibrant and effective regulatory mechanisms, which would further strengthen the legal infrastructures, so crucial to the success of Electronic Commerce. All these regulatory mechanisms and legal infrastructures come within the domain of Cyberlaw. Cyberlaw is important because it touches almost all aspects of transactions and activities
concerning the internet, the World Wide Web and Cyberlaw. 

Cyberlaw concerns everyone. As the nature and scope of internet is changing and this new medium is being seen as the ultimate medium ever evolved in human history, every activity of yours in cyberspace can and will have cyber legal perspective. 

Today, the awareness about Cyberlaw is beginning to grow. Earlier, many technical experts felt that legal regulation of internet was not necessary. But with the rapid growth of technologies and Internet, it is clear that no activity on Internet can remain free from the influence of Cyberlaw. Publishing a web page is an excellent way for any commercial business or entity to vastly increase its exposures to millions of persons, organizations and governments worldwide. It is this feature of the Internet, which is causing much controversy in the legal fraternity. 

Cyberlaw is a constantly evolving process. As new opportunities and challenges are surfacing, Cyberlaw, being a constantly evolving process, is suitably modifying itself to fit the needs of the time. As the Internet grows, numerous legal issues arise relating to Domain Names, Intellectual Property Rights, Electronic Commerce, Privacy, Encryption, Electronic Contracts, Cybercrime, Online Banking, and Spamming and so on.

MCQ of Software Engineering with answer Set-2

0

1.  Reliability in a software system can be achieved using which of the following strategies.
A) Fault avoidance
B) Fault tolerance
C) Fault detection
D) All the above

2. ………………. strategy assumes that residual faults remain in the system and can continue in operation after some system failures have occurred.
A) Fault avoidance
B) Fault tolerance
C) Fault detection
D) None of the above


3. ……………… involves modifying the system so that the fault does not recur.
A) Failure detection
B) Damage assessment
C) Fault recovery
D) Fault repair

4. …………………… is an approach to program development whereby programmers assume that there may be undetected faults or inconsistencies in their programs.
A) Defensive programming
B) Effective programming
C) Strong programming
D) Known programming

5. ……………… is a classification scheme, which shows how an object class is related to other classes through common attributes and services.
A) Hierarchy
B) Inheritances
C) Taxonomy
D) None of the above

6. ……………. is a list of names used by the systems, arranged alphabetically.
A) Data Library
B) Data Dictionary
C) Name Dictionary
D) System Dictionary

7. The ………………….. model of system design is a distributed system model which show how data and processing is distributed across a range of processors.
A) repository
B) client-server
C) abstract machine
D) None of the above

8. The main design activities in the software design process are
i) System specification                   iii) Component design
ii) interface design                           iv) algorithm design
A)  ii, iii and iv only
B) i, ii and iii only
C) i, iii and iv only
D) All i, ii, iii and iv

9. ……………………. is the process, which controls the changes made to a system, and manages the different versions of the evolving software product.
A) Software management
B) Configuration management
C) Version management
D) Release management

10. The different types of software maintenance systems are
A) Corrective maintenance
B) Adaptive maintenance
C) Perfective maintenance
D) All the above

Answers:
1.    D) All the above
2.    B) Fault tolerance
3.    D) Fault repair
4.    A) Defensive programming
5.    C) Taxonomy
6.    B) Data Dictionary
7.    B) client-server
8.    D) All i, ii, iii and iv
9.    B) Configuration management
10.   D) All the above

You Might also view the following Related Posts

You can view the following other posts

Solved MCQ of Software Engineering Set-1

0

1.  …………………. software resides only in read only memory and is used to control products and systems for the consumer and industrial markets.
A) Business
B) Embedded
C) System
D) Personal

2. …………………. software makes use of non numerical algorithms to solve complex problems that are not amenable to computation or straightforward analysis.
A) Artificial Intelligence
B) Web-based
C) Embedded
D) Real time

 3. …………….. is a sub discipline of computer Science that attempts to apply engineering principles to the creation, operation, modification and maintenance of the software components of various systems.
A) Computer Engineering
B) Hardware Engineering
C) Software Engineering
D) Component Engineering

 4. The cost of software engineering includes approximately …………… of development costs and …………. of testing costs.
A)  50%, 50%
B)  40%, 60%
C)  80%, 20%
D) 60%, 40%

5. Software maintenance refers to the support phase of software development which includes.
A) Correction
B) Adaption
C) Enhancement
D) All the above

6. The ……………… model stipulates that the requirements be completely specified before the rest of the development can processed.
A) Waterfall
B) Rapid Application Development (RAD)
C) Iterative Development
D) Incremental Development

7. State whether True or False for Rapid Application Development (RAD).
i) RAD is not appropriate when technical risks are high.
ii) For large but scalable projects, RAD requires sufficient human resources to create the right number of RAD teams.
A) True, False
B) False, True
C) True, True
D) False, False

8.  ………………… model couples the iterative nature of the prototyping with the controlled and systematic aspects of the linear sequential model.
A) Spiral
B) Rapid Application Development (RAD)
C) Iterative Development
D) Incremental Development

9. ………………………. is a function of the number of failures experienced by a particular user of that software.
A) Software Usability
B) Software reliability
C) Software performance
D) None of the above

10. Statistical testing is a software testing process in which the objective is to measure the ……………..  of the software rather than to discover software faults.
A) availability
B) reliability
C) reusability
D) all of the above
Answers:
1.       B) Embedded
2.       A) Artificial Intelligence
3.       C) Software Engineering
4.       D) 60%, 40%
5.       D) All the above
6.          A) Waterfall
7.          C) True, True
8.          A) Spiral
9.          B) Software reliability
10.     B) reliability

You Might also view the following Related Posts

You can view the following other posts

MCQ of Artificial Intelligence (AI) with answer Set-2

0

1. ………….. is called the father of AI.
A) James C Gosling
B) Dennis Ritchie
C) Alan Turing
D) Isaac Newton

2. In AI ………………………. is a combination of data structures and interpretive procedures.
A) Knowledge
B) Meta-knowledge
C) Artificial Knowledge
D) Performance


3. The …………………… approach uses the knowledge of mathematics and engineering.
A) rationalist
B) Top-down
C) bottom-up
D) push-pop approach

4. We also use knowledge about what we know, called ……………………..
A) Meta-Knowledge
B) Performance Knowledge
C) Standard knowledge
D) Specific knowledge

5. The Artificial Intelligence is concerned with designing intelligent computer systems that exhibit intelligent characteristics expressed by …………………..
A) Functional behavior
B) Human behavior
C) Human brain
D) Statistical analysis

6. ………………… includes what we know about our own performance as cognitive processors.
A) Meta-Knowledge
B) Performance Knowledge
C) Standard knowledge
D) Specific knowledge

7. State whether the following true or false.
i) AI is used in diverse fields like space exploration, robotics.
ii) AI is used for military purpose
A) i-True, ii-False
B) i-True, ii-True
C) i-False, ii-False
D) i-False, ii-True

8. The goals of AI systems can be described in terms of cognitive tasks like
A) Recognizing objects
B) Answering questions
C) Manipulating robotic devices
D) All of the above

9. ………………….. is computerized advice-giver, that is capable of reasoning but which is usually confined to a rather narrow field of knowledge.
A) Expert system
B) Knowledge system
C) Common system
D) Communication system

10. ………………. involves relating something new to what we already know in a psychologically complex way.
A) Knowledge Acquisition
B) Knowledge retrieval
C) Reasoning
D) Meta-level reasoning
Answers:
1.       C) Alan Turing
2.       A) Knowledge
3.       A) rationalist
4.       A) Meta-Knowledge
5.       B) Human behavior
6.       A) Meta-Knowledge
7.       B) i-True, ii-True
8.       D) All of the above
9.       A) Expert system
10.   A) Knowledge Acquisition

You Might also view the following Related Posts

You can view the following other posts

Solved MCQ of Artificial Intelligence (AI) Set-1

0

1. The High level language …………………. has now become the dominant AI programming language.
A) Ada
B) Lisp
C) AI pro
D) High AI

2. In AI, a representation of …………………… is a combination of data structures and interpretive procedures that is used in the right way in a program.
A) Knowledge
B) Power
C) Strength
D) Intelligence


3. ………….. is an environment in which the search takes place.
A) problem place
B) problem instance
C) problem space
D) Non of  the above

4. The fundamental ideas about retrieval that have been developed in AI systems might be termed as ……………… and ……………………
A) Analogy, reasoning
B) Thinking, doing
C) Event, domain
D) Linking, lumping

5. Robot machine might have cameras and infrared range finders for ………… and various motors of ……….
A) Sensors, Agents
B) Agents, Actuators
C) Actuators, Sensors
D) Sensors, Actuators

6. ……………….. are rules of thumb that may solve a given problem, but do not guarantee a solution.
A) Strong methods
B) Weak methods
C) Heuristic
D) Probabilistic

7. ………………. is the primary consideration in designing knowledge-based AI systems.
A) Analogy
B) Efficiency
C) Efficacy
D) Acquisition

8. The initial state and successor function implicitly define state space of the problem
A) Initial state
B) State space
C) problem space
D) problem place

9. …………….. are data structures giving "snapshots" of the condition of the problem at each stage of its solution.
A) States
B) Operators
C) Heuristic
D) None of the above

10. ………………. are means for transforming the problem from one state to another.
A) States
B) Operators
C) Heuristic
D) None of the above
Answers:
1.       B) Lisp
2.       A) Knowledge
3.       C) problem space
4.       D) Linking, lumping
5.       D) Sensors, Actuators
6.       C) Heuristic
7.       B) Efficiency
8.       B) State space
9.       A) States
10.   B) Operators


You Might also view the following Related Posts

You can view the following other posts

Solved MCQ of Database Management System (DBMS) Set - 8

0

1. Reflexivity property says that X - Y is true if Y is ………………….

A) Subset of X

B) Null set of X

C) Super set of Y

D) Subset of Y


2. Anything that affects the database schema is a part of

A) DML

B) DCL

C) DDL

D) All of the above


3. An instance of a relation is a time varying set of ………………….

A) Tuples

B) Rows

C) Both of them

D) None of them


4. In the ………………… mode any record in the file can be accessed at random

A) Sequential access

B) Random access

C) Standard access

D) Source access


5. Which can be used to delete all the rows if a table?

A) Delete * from table_name

B) Delete from table_name

C) Delete table_name

D) all rows cannot be deleted at a time.


6. Which if the following is not the type of data integrity.

A) Key integrity

B) Domain integrity

C) Entity integrity

D) Referential integrity


7. 4NF stands for ..

A) Fourth Normal File

B) Fourth Normal Form

C) Fourth Normal Fraction

D) Fourth Negative File


8. A ……………… allows to make copies of the database periodically to help in the cases of crashes & disasters.

A) Recovery utility

B) Backup Utility

C) Monitoring utility

D) Data loading utility


9. ………………. Allows definitions and query language statements to be entered; query results are formatted and displayed.

A) Schema Processor

B) Query Processor

C) Terminal Interface

D) None of the above


10. The main task carried out in the …………… is to remove repeating attributes to separate tables.

A) First Normal Form

B) Second Normal Form

C) Third Normal Form

D) Fourth Normal Form

Answers:

1. A) Subset of X
2. C) DDL
3. C) Both of them
4. B) Random access
5. A) Delete * from table_name
6. A) Key integrity
7. B) Fourth Normal Form
8. B) Backup Utility
9. C) Terminal Interface
10. D) Fourth Normal Form

MCQ of Visual Basic dot net (VB.Net) with answer set-2

0

1. Using a ________ variable does not enable us to create read-only properties that are often required by a class.
A. public
B. private
C. protected
D. friend

2. A ___________ performs invisible tasks even if you write no code.
A. destructor
B. private method
C. constructor
D. function

3. The ___________________________________ does not describe inherited member functions, inherited operators, and overridden virtual member functions.
A. Class Library Reference
B. Library
C. Objects
D. Classes

4. The ______________________ group classes according to their common services.
A. objects
B. inheritance
C. Namespaces
D. programs

5. Whenever an application is created, a ______ is added.
A. Form
B. Class
C. Property
D. Object
6. _________ are interactive objects that you place in dialog boxes or other windows to carry out user actions.
A. Controls
B. Objects
C. Classes
D. Forms

7. The _______________ class provides static methods to start, stop, or filter Windows messages in an application.
A. Forms
B. Windows
C. Application
D. Control

8. The ___________is a systematic class framework used for the development of system tools and utilities.
A. .Net Framework Class Library (FCL)
B. .Net tools
C. Visual Basic 2005
D. Visual Basic 6

9. The ______________ method converts the value of this instance to a double representing the OLE automation date.
A. From OA Date
B.TO OA Date
C. Today
D. Now

10. The _________________ enable us to pass data between a program and a class.
A. Functions
B. Properties
C. Procedures
D. Variables

Answers:
1. A. public
2. C. constructor
3. A. Class Library Reference
4. C. Namespaces
5. A. Form
6. A. Controls
7. C. Application
8. A. .Net Framework.... (FCL)
9. B.TO OA Date
10. B. Properties

You Might also view the following Related Posts 

You can view the following other posts

يتم التشغيل بواسطة Blogger.