Contents

Patents are designed to protect…….
a) inventions                       
b) business identity
c) literary content               
d) artistic expression


a

Which of the following are typically protected via trademark?
a) inventions                        
b) business identity
c) literary content               
d) artistic expression


b

A process of sending high volume of requests to a system so the system cannot hand legitimate users is called…….
a) data diddling
b) zapping
c) denial of service            
d) bombing


c

A program placed for legitimate program for unauthorized and hidden access to system is called……
a) worm
b) worm
c) trapdoor
d) bomb


c

If a legitimate user does not log off from system, an illegitimate user may be involved…
a) piggy backing
b) zapping
c) scavenging                       
d) trapdoor


a

Zapping software is used for…….
a) bypass security system
b) checking virus on system
c) destroy sensitive data    
d) none of these

a