5. An agreement enforceable by law is called |
a) An agreement b) Contract c) a & b d) none of these |
6. All the agreements are contracts if they are
made by free consent of the parties competent to contract for a
_____consideration and object a) Any b) Lawful c) Unlawful d) None of these |
10.
In contract
of guarantee the person who gives guarantee is called |
a) Surety b) Principal debtor c) Both (a) and (b) |
12. _____ and _____ can lead to performance which is viewed as unsatisfactory.
B) appendix
C)agreement
D) None
1._________ is an addition made towards the end of a thesis.
A) annex
B) appendix
C)agreement
D) None
3.which is the type of software services contract.
B) contract line
C)consultancy
D) All
B) obligation of the client
C)consultancy
D) ownership of rights
5..which issues dealt with standard terms & conditions.
A) penalty clauses
B) obligation of the client
C)ownership of rights
D) All
B)appendix
C)agreement
D) none
B)appendix
C)agreement
D) none
9._______________is defined as the duty,obligation or even authority.
a. work
b. responsibility
c. democracy
d. authority
7
10.________________is defined as a group of people working together to create a surplus.
a. routline
b. organisation
c. System d. military
1. How many type of contractual arrangement are there?
a) Two
b) Four
d) One
2. What are the issues dealt with standard terms & conditions?
a) Ownership of right
b) Penalty Clauses
c) Obligation of the client
d) All of above
3. _____ is on the basis of a fixed rate for each man day worked
a) Payment
b) Job duration
c) Both a & b
d) None of these
4. The staff work under the direction of the _______.
a) CEO
b) Manager
c) Director
d) Client
5. Issues that do not arise are _________.
a) Delay Payments
b) Acceptance Tests
c) Both a & b
d) None
6. _________ are typically used to assess some aspect of an organization and to make proposals for improvements.
a) Managers
b) Directors
c) Consultants
d) None
7. ________ of a consultancy project is therefore usually a report or other document.
a) Third product
b) Middle product
c) First product
d) End product
8. Consultancy projects are usually undertaken for a
a) Fixed price
b) Low price
c) Very high price
d) Normal price
9. The supplier ________ to provide the services of one or more staff to work for the client.
a) Disagree
b) Agree
c) Rejects
d) None of above
a) Time
b) Materials
c) Both a & b
d) None
1)
Computing economics can
A) Solve
problems
B) Simulate
models
C)
Both A & B
D) None of
these
2)
Computers have economic benefits like:
A) Saving
paper
B) Saving
labour
C) Communication
speed and costs
D)
All of these
3) Economic
benefit of internet is
A) lower
prices for consumers
B) faster
productivity growth
C)
Both A & B
D) None of
given
4)
Benefit of computing is
A) increase
your productivity
B) Connects
you to the Internet
C) Keeps you
connected.
D)
All of these
5)
Computing economics is a field of economic study at the intersection of
A) computer
science
B) economics
C) management
science
D)
All of these
6)
The economic context can be shaped actively by the city and influences
businesses to
A) make
investments
B) create
jobs
C)
Both A & B
D) None of
these
7)
Economics is defined as a science that deals with _______ of goods and services
A) making
B)
distributing
C) selling
and purchasing
D)
All of these
8)
stock market is example of:
A) computer
science
B)
Economics
C) IT
D) Software
Engineering
9)
Areas of study within the field of computational economics include:
A)
Agent-based computational modeling.
B)
Computational finance
C)
Computational econometrics and statistics.
D)
All of these
10)
How many computing disciplines are:
A) 3
B) 4
C)
5
D) 6
11)
Economics computing is the _____of economics
A)
Field
B) Branch
C) Issue
D)
Way
12) For economists, the word “utility” means:
A) Versatility and flexibility
B) rationality
C) pleasure and satisfaction
D) purposefulness
13) A situation where there are no
differences among products or services, and the only basis of choosing products
is price is known as ______________.
A) A value web
B) Value chain
C) Profit
E)
Commoditization
14) the
most fundamental economic problem is
A) Security
B) society
C) Health
D) Scarcity
15)
What purpose use of economics context of computing
A) may noise
B) For problem solving
C) for wealth
D) for hospital
16) The
largest component of a Web site budget is ______________.
A.
system
maintenance
B. system development
C. content design and
development
D. telecommunications
17)
Internet users account for about ______________ of the world's population.
A. 7%
B.
17%
C. 27%
D. 47%
18)
Which of the following is not a limitation of the current Internet?
A. insufficient capacity
throughout the backbone
B. network architecture
limitations
C.
insufficient
reach
D. best-efforts QOS
19) The Economists point of view that scarcity
confronts
A)the rich but not the poor.
B)the poor but not the rich.
C) Both the poor and the rich.
D)neither the poor nor the rich
20)
Which is include in economics computing
A) Computing finance
B)problem
solving
C) business
21) As an
economic concept, scarcity applies to
A)neither
time nor money.
B) Both money and time.
C) time but not money.
D)all of these
22)
Macroeconomics is the branch of economics that studies
A)prices of
individual things
B) opposed
to trivial, issues.
C) markets
work.
D) The economy as a
whole
23) In economics, positive statements are about
A)macroeconomics, not microeconomics.
B) The way things
are.
C) the way things bought to be.
D)microeconomics is not the branch of ecnomics
24) Computing
tool for design of _____internet market
A) Automated
B)proessional
C)sacricity
25)
Computing economics can solve problem and stimulate models involving_____
A) Calculation
B)money
problem
C)social
issue
26) An
economic model includes
A) Only details considered essential.
B)all known
details in order to increase its accuracy.
C) no use of ceteris paribus.
D)post hoc statements
27)
Scarcity requires that people must
A) Trade.
B) Compete.
C) Cooperate.
D) Make choices
28)
As an economic concept, scarcity applies to
A) Neither
time nor money.
B) Both money and time.
C) Time but not money.
D) Money but not time
29)
In economics, positive statements are about
A) Macroeconomics, not microeconomics.
B) The way things are.
C) The way things ought to be.
D) Microeconomics, not macroeconomics
30) Management, science, also known as _________, is a field of applied mathematics
A) Operations research
B) Accounting
C) System Theory
D) Exchange Commission
31)
Disciplines of computing are:
a)
Software Engineering
b)
Computer Science
c)
Information Technology
d) All Of These
32) Key
factor of economic growth is:
a)
People
b) Technology
c)
Software
d)
None
33) A
company requires their employees to shut down there system at the end of the
working day. This rule was implemented to?
a) Make the network secure
b)
Improve performance
c)
Make system reliable
d)
All of these
34) Which of them is not a vulnerability to
information security?
a) flood
b) without deleting data, disposal of storage
media
c) unchanged default password
d) latest patches and updates not done
35) Information Technology programs focus on the
a)
Computer equipment
b)
Software
c)
Both a and b
d)
None
36) In Demand Careers Options for Software
Engineers
a)
Full Stack Developer
b)
Cloud Engineer
c)
Scrum Master
d)
All of these
37)In economics the
word “utility” means:
a)
Purposefulness
b)
Rationality
c)
Satisfaction
d)
Flexibility
38)Which is not
include in the efficiency of software product?
responsiveness
b) licensing
c) memory utilization
d) processing time
39)Attributes of good software are
a)
Maintainability
b)
Functionality
c)
Development
d)
Both a and b
40)In
economics what do you mean by the supply of goods?
a) Total stock in the warehouse
b)
Quantity of the good offered for sale at a particular price per unit of time
c) Both
d) None
1. The software components are?
a. 3
b. 9
c. 5
d. none
2. The especially directive 91/250/ EEC was first time
implemented in?
a.
Spain
b. Germany
c. Sweden
d. Finland
3. Authors and related rights low in kz are?
a. 12 31 32 15 67
b. 40 41 42 43 49
C. 50 56 61 77 33
d. 22 24 26 20 11
4-Intellectual Property Rights (IPR) protect the use of
information and ideas that are of
- Commercial
value
- Social
value
- A and
b
- none
5-The term ‘Intellectual Property Rights’ covers
- know –
how
- Copyrights
- Trade
dress
- All
of the above
(d)
6-The following cannot be exploited by assigning or by
licensing the rights to others.
- Trade marks
- Patents
- Both a
& b
- All of
the above
(c)
7-The following can be patented
- Machine
- Process
- Composition
of matter
- All
of the above
8-Trade mark
- is
represented graphically
- is
capable of distinguishing the goods or services of one person from those
of others
- may
include shapes of goods or combination of colors
- All
of the above
9-In India, the literary work is protected until
- Lifetime
of author
- 25
years after the death of author
- 40
years after the death of author
- 60
years after the death of author
10-Design does not include
- features
of shape
- composition
of lines or colors
- mode
or principle of construction
- None
of the above
11-Which of the following is (are) included in
Geographical indications of Goods
- Handicraft
- Foodstuff
- Manufactured
- All
of the above
(d)
12. Utility model may
protects
(a) Incremental
invention
(b) Block-baster
invention
(c) Both (a) and (b)
(d) None of the
above
(c)
13. Copyright
protection is available for
(a) Literary work
(b) Musical work
(c) Artistic work
(d) All the above
(d)
14. Computer program
is considered as
(a) Literary work
(b) Artistic work
(c) Technical work
(d) None of the
above
(a)
15. Who administer
UDRP?
(a) WTO
(b) WIPO
(c) Supreme Court
(d) High court
16. Which of these
statements about the European Patent Convention is true?
a) It provides for
a single patent covering all member states
b) It is an EU
treaty
c) It sets up the
European Patent Office, which deals with the granting and enforcement of Eu
patent
d) It harmonizes the patent laws of the member state
17. Legal framework on computer programming
starts?
a) 1957
b) 1967
c) 1983
d )1996
18. Numbers of Berne
convention member states are?
a)
274
b)
541
c)
175
d)
164
19. According to studies of 2011 the software piracy
ratio in Eastern Europe was?
a)
23%
b) 37%
c) 62%
d) None
20. In kz the person
could go to jail from 3 to 6 years under the article?
a)
49
b) 82
c) 198
d ) 172
21. The Intellectual
property was established by which organization?
A WIPO
B ICJ
C FATF
D WHO
22. Intellectual Property
day is celebrated on _________day?
A 26 April
B 30 May
C 13 June
D 10 July
23. Intellectual property is
a property that arises from__________?
A World intellect
B Organization intellect
C Human intellect
D None of the above
24. Intellectual property
comprises_______________ form?
A Literary
B Artistic work
C Industrial property
D All of the above
25. Book painting, musical
composition are the form of ______ ?
A Literary
B Artistic
C Industrial property
D Both 1 & 2
26. Literary and artistic
work are protected by_________?
A Trade mark
B Patent
C Copy right
D All of the above
27. The product of an idea
or concept for commercial purpose is called_______?
A Industrial
property
B Literary work
C Artistic work
D None of the above
28. Industrial property are
protected by _______?
A Trade mark
B Industrial design
C Geographical indication
D All of the
mentioned
29. A symbol, logo, word or
sound used to identify a business or a product in commerce is
called___________?
A Copy right
B Trademark
C Patent
D None of the above
30. An invention is patentable
if__________?
A Novel
B Useful
C Not obvious
D All of the
mentioned
1. The Intellectual property
was established by which organization?
1. WIPO
2.
ICJ
3.
FATF
4.
WHO
2. Intellectual Property day is
celebrated on _________day?
1.
26
April
2. 30 May
3. 13 June
4. 10 july
3. Intellectual property is a
property that arises from__________?
1. World intellect
2. Organization intellect
3.
Human
intellect
4. None of the above
4. Intellectual property
comprises_______________ form?
1. Literary
2. Artistic work
3. Industrial property
4.
All
of the above
5. Book painting, musical
composition are the form of ______ ?
1. Literary
2. Artistic
3. Industrial property
4.
Both
1 & 2
6. Literary and artistic work
are protected by_________?
1. Trade mark
2. Patent
3.
Copy
right
4. All of the above
7. The product of an idea or
concept for commercial purpose is called_______?
1.
Industrial
property
2. Literary work
3. Artistic work
4. None of the above
8. Industrial property are
protected by _______?
1. Trade mark
2. Industrial design
3. Geographical indication
4. All of the mentioned
9. A symbol, logo, word or
sound used to identify a business or a product in commerce is
called___________?
1. Copy right
2. Trademark
3. Patent
4. None of the above
10. An invention is patentable
if__________?
1. Novel
2. Useful
3. Not obvious
4. All of the mentioned
1-Intellectual Property
Rights (IPR) protect the use of information and ideas that are of
- Ethical
value
- Moral
value
- Social
value
- Commercial
value
2-The term ‘Intellectual
Property Rights’ covers
- Copyrights
- Know-how
- Trade
dress
- All
of the above
3-The following cannot be exploited
by assigning or by licensing the rights to others.
- Patents
- Designs
- Trademark
- All
of the above
4-The following can be
patented
- Machine
- Process
- Composition
of matter
- All
of the above
6-Trade mark
- is
represented graphically
- is
capable of distinguishing the goods or services of one person from those
of others
- may
include shapes of goods or combination of colors
- All
of the above
8-In India, the literary
work is protected until
- Lifetime
of author
- 25
years after the death of author
- 40
years after the death of author
- 60
years after the death of author
9-Design does not include
- features
of shape
- composition
of lines or colors
- mode
or principle of construction
- None
of the above
11-Which of the following is
(are) included in Geographical indications of Goods
- Handicraft
- Foodstuff
- Manufactured
- All
of the above
12. Utility model may
protects
(a) Incremental invention
(b) Block-baster invention
(c) Both (a) and (b)
(d) None of the above
13. Copyright protection is
available for
(a) Literary work
(b) Musical work
(c) Artistic work
(d) All the above
14. Computer program is
considered as
(a) Literary work
(b) Artistic work
(c) Technical work
(d) None of the above
15. Who administer UDRP?
(a) WTO
(b) WIPO
(c) Supreme Court
(d) High court
16. Which of these
statements about the European Patent Convention is true?
a) It provides for a single patent covering
all member states
b) It is an EU treaty
c) It sets up the European Patent Office,
which deals with the granting and enforcement of Eu patent
d) It harmonizes the patent laws
of the member state
17. Legal framework on computer programming
starts?
a) 1957
b) 1967
c) 1983
d
)1996
18. Numbers of Berne
convention member states are?
a) 274
b) 541
c) 175
d) 164
Software Safety Liability & Practice
1. Computer-controlled
systems are to be found in a wide range of diverse applications such as:
a. Industry
b. Medicine
c. Transport
d. All of these
2. Professional and trade
associations should devise ________ practice to govern their members.
a. Lines of
b. Codes of
c. Amount of
d. None of these
3. System designers and
software engineers may have legal responsibilities under statutes such as:
a. Health
b. Safety
c. Danger
d. Both a & b
4. The area of law in which
manufacturers, distributors, suppliers and retailers are held responsible for
any injuries products cause:
a. System liability
b. Customer liability
c. Product liability
d. Developers liability
5. “knowledge and the ability
to apply that knowledge” is:
a. Competence
b. Negligence
c. Evidence
d. Experience
6. Factors such as training
and relevant experience are also considered important traits for a:
a. Competent Software
Engineer
b. Software
Engineer
c. Equivalent
Software Engineer
d. Electrical
Engineer
7. Factors affecting
system safety include:
a. Hazards
analysis
b. Design
c. Documentation
d. All
of these
8. Safety integrity analysis
and risk assessment is a factor that affects:
a. Product
safety
b. Device
safety
c. System
safety
d. None
9. ______ is the
process of deciding what might be a hazard and what should be done if something
is exposed to this hazard.
a. Hazard safety
b. Hazard analysis
c. Hazard occurring
d. Hazard exposing
10. Hazard analysis is
used as the _____ in a process used to assess risk.
a. First step
b. Second step
c. Fourth step
d. Fifth step
11. In _______ hazard
analysis, we attempt to determine the likelihood of an adverse event occurring,
and the potential cost.
a. Qualitative
b. Quantitative
c. Both
d. None
of these
12. Requirements
analysis is the first step in the system_______.
a. Evaluation
process
b. Testing
process
c. Design
process
d. None
of these
13. “A set of
correlated members (i.e. system of currency)” is a role of:
a. Testing
b. Analysis
c. Requirements &
specifications
d. Design
14. _______ is the
probability of failure-free software operation for a specified period of time
in a specified environment.
a. Software reliability
b. Software piracy
c. Software accuracy
d. All of these
15. Reasons for
software failure include:
a. Errors
b. Carelessness
in writing code
c. Ambiguities
d. All
of these
16. “Inadequate
testing” is the reason for software:
a. Accuracy
b. Failure
c. Success
d. None of these
17. Customer’s
requirements are described in which document:
a. SAS
b. STS
c. SRS
d. None of these
18. The software design
process can be divided into ______ levels of design.
a. Five
b. Two
c. Six
d. Three
19. The concept that focuses on
components or elements of a structure is called:
a. Interface
design
b. Architectural
design
c. Detailed
design
d. None
of these
20. ______ is the
process of verifying and validating that a software or application is bug free
and meets the technical requirements.
a. Analysis
b. Testing
c. Both
d. None
of these
21. The process of
fixing a bug in the software is called:
a. Debugging
b. Bugging
c. Bug
detection
d. All
of these
22. The measurement of
performance required for a safety instrumented function is:
a. SIF
b. PIF
c. SIL
d. None
of these
23. For
a programmer the reliable documentation is always necessary.
a. True
b. False
24. The
main focus of documentation is:
a. Development
b. Maintenance
c. Knowledge
transfer
d. All
of these
25. _______failure can cause
loss of hardware, software, data, or information.
a. Software
b. System
c. Both
d. None of these
26. Which of the following
terms is a measure of the probability that the system will cause an accident?
a. Accident
b. Hazard probability
c. Damage
d. Risk
27. A message displayed when a
computer malfunctions or encounters an unexpected situation is:
a. System error
b. System failure
c. System damage
d. Accident
28. ______is action that is
taken to make the bad results of something as small as possible, when it is
impossible to avoid bad results completely.
a. Error limitation
b. Damage limitation
c. Both
d. None of these
29. First step in the software
development life cycle ?
a. Design
b. Problem identification
c. Analysis
d. Implementation
30. Structure chart is the
tool used for:
a. Structured designing
b. Map designing
c. Structure analysis
d. All of these
31. An algorithm is a step by
step _______ used to solve a problem.
a. Code
b. Request
c. Explanation
d. Instruction
32. Actual programming
of software code is done during the ____________ step in the SDLC.
a. Design
b. Development
c. Documentation
d. Both b & c
33. Database structures are
designed and implemented by:
a. Project managers
b. Programmers
c. Database administrators
d. Technical writers
34. One of the most important
jobs for a ___________ risk management.
a. Project manager
b. Investor
c. Client
d. Production team
35. Risks are derived from the
organizational environment where the software is being developed are:
a. Estimation risks
b. Organizational risks
c. People risks
d. None of these
36. Now a days the most
important project management task is
a. Risk management
b. Team management
c. Task management
d. All of these
37. Software engineers need to
consider hardware when designing a computer-based system.
a. True
b. False
38. The elements involved in
the system model template are:
a. User interface
b. Input
c. Output
d. All of these
39. Is it possible to have a
safe system that is not secure?
a. Yes
b. No
40. The architectural
representations can be enable for information among project______.
a. Managers
b. Team
c. Stakeholders
d. None of these
1. HRM is a function in organizations designed to.
a. Procurement
b. Development
c. Maximize employee performance
d. None
2. Human resource management is the responsibility of
a. Operation manager
b. Middle Managers
d. First line managers
c. All Managers
3. The scope of human resource management includes
a. Management of people
b. Staff training
c. Development with a strategic approach
d. All of the above
4. Human resource management is normally in nature
a. Proactive
b. Reactive
c. Combative
d. none of the above
5. Organization relies on the following sources of capital
a. cultural, human and system capital
b. social, cultural and human capital
c. cultural, human and source capital
d. none of the above
6. A model of human resource management include
a. A corresponding commitment to the organization is expected from
employees
b. Human resource management is the responsibility of all managers
c. Maximum utilization of human resources available to the enterprise
d. All of above
7. The real challenge in human resource management is
a. To shift employee attitudes with rules at work to
commitment
b. Employ training
c. Employ management
d. None
8. Direct and regular face to face contact between managers and
workers is emphasized
a. To keep an eye on employs
b. To maintain attendance
c. To build trust and to maintain motivation
d. None
9. The trick is to reconcile motivating individuals with team
building because
a. Team working is a vital element
b. It is teams, not individuals, who complete projects
c. Both a & b
d. None
10. -------------- is central in HRM strategies
a. Flexibility
b. Discipline
c. Work rate
d. Performance appraisal
11. A crucial part of keeping effective workers content is:
a. A system of promotion without becoming managers
b. Discipline management
c. Finance strategy
d. Economic strategy
12. Which allows decision makers to look more critically now than ever
before at work output in offices.
a. Firm specific skills
b. Surveillance of work rate
c. Individual behavior
d. None of the above
13. Computing companies find that IT graduates often lack skills
like:
a. Hardware skills
b. Firm specific skills
c. People handling skills
d. None
14. Around ---------- employees each year still die as a result of accidents
at work
a. 300
b. 400
c. 200
d. 100
15. A model of human resource management usually consists of __
steps
a. Four
b. Five
c. Six
d. Seven
16. Health and Safety Act 1974 involve:
a. Specific requirements
b. General (and far reaching) requirements
c. No requirements on manufacturers or suppliers
d. All of the above
17. Unitary perspective of HRM model involve
a. Central goal of team
b. One focus of loyalty
c. One focus of authority
d. All
18. What do rational processes to recruitment and selection
typically ignore?
a. Labor market demand
b. Wages
c. The time it takes to get to work
d. The use of power and micropolitics by managers
19. Which is the most popular method of recruiting applicants to
jobs?
a. Radio and TV advertisement
b. Corporate website
c. Employee referral schemes
d. Commercial job boards
20. Which selection method remains the most used by organizations?
a. Interviews
b. Ability tests
c. References
d. A trial period
21. ________ is the right to make decisions, to direct the work of
others, and to give orders.
a. Authority
b. Leadership
c. Management
d. None
22. What is the main reason employers give why employees are not
fully proficient?
a. Lack of experience
b. Over qualified
c. Lack of numeracy skills
d. Lack of literacy skills
23. Which of the stages below are part of the Systematic Training
Cycle?
a. Analyze operating conditions
b. Design training
c. Deliver on time
d. Evaluate customer feedback
24. What is the main disadvantage of off-the-job learning?
a. It isn't always directly related to real organizational
issues and needs
b. The time needed to set up
c. Accessibility for those training
d. Long term costs
25. Which of the following is not a recruitment technique?
a. Interviews
b. performance appraisal
c. psychometric testing
d. ability tests
26. Which one of the following becomes a creative factor in
production?
a. Land
b. Capital
c. Consumers
d. Human Resources
27. People cast in the role of contributors to production are
called __
a. Capitalist
b. Land owners
c. Human Resources
d. Consumers
28. Wide range of abilities and attributes possessed by people are
called as
a. Management
b. Human Resources
c. Entrepreneur
d. Intrapreneur
29. Deployment of which resource is difficult to master
a. Human
b. Land
c. Capital
d. Natural
30. The focus of Human Resource Management revolves around"
a. Machined.
b. Motivation
c. Money
d. Men
31. Quality- oriented organization primary concern centers around
__
a. Coordination
b. Communication
c. Human Resources
d. Discipline
32. Quality goals require alignment with:
a. Production
b. Human Resources
c. Finance
d. Purchase
33. Demand for human resources and management is created by
a. Expansion of industry
b. Shortage of labor
c. Abundance of capital
d. Consumer preferences
34. Management function arises as a result of:
a. Consumer preferences
b. Abundance of capital
c. Expansion of industry
d. Shortage of labor
35. Human Resource Management is primarily concerned with:
a. Sales
b. Dimensions of people
c. External environment
d. Cost discipline
36. Human Resource Management aims to maximize employees as well as organizational
a. Effectiveness
b. Economy
c. Efficiency
d. Performativity
37. The difference between human resource management and personnel management
is:
a. Insignificant
b. Marginal
c. Narrow
d. Wide
38. Human Resource Management function does not involve:
a. Recruitment.
b. Selection
c. Cost control
d. Training
39. Which one is not the specific goal of human resource
management?
a. Attracting applicants
b. Separating employees
c. Retaining employees
d. Motivating employees
40. Identify which one is an added specific goal of human resource
management:
a. Retraining
b. Learning
c. Unlearning
d. Separating
1. How an artist can protect his
work?
1. Copyright
2. Trademark
3. Registered design
4. Patent
2. An Example of geographical
indication?
1. BMW
2.
Sargodha Kinow
3. Playstation
4. World wide web
3. What does a trademark protects?
1. An invention
2. Work of art
3. Logos, names and brands
4. Secret formula
4. Duration of patent is?
1. 10 years
2. 20 years
3. 40 years
4. 60 years
5.
Designers can protect their work by?
1.
Copyright
2. Trademark
3. Registered
design
4. Patent
6.
In World the duration of
copyright is ?
1. 10 years after the creation of work
2. 50 years after the creation of work
3. 10 years after the death of person who created work
4. 50 years after the death
of person who created work
7.
If someone want to invent something then he can protect by?
1.
Copyright
2. Trademark
3.
Registered
design
4. Patent
8. Requirement
for patent are:
1. File an application at
patent office which must comply with formal and technical requirements
2.
Draft the full specification of patent they
seek, which cannot be later amended
3.
Demonstrate that their invention works
4.
State the date on which the invention was
first “reduce to practice”
9. A
patent will not work if :
1.
Products falling within the claim were sold
to public before the priority date:
2.
The process claimed was carried on
commercially before the priority date:
3. A description of the
product (in case of product claim) was published before the priority date
4.
A video describing how to make the product
claimed was published on internet before date
10.
You can infringe a patent by
1.
Making a product for your own personal use
2.
Making different products to invention in
order to research their technical effectiveness
3. Selling the main
components of product, together with instructions how to assemble it using
commonly available fasting components
such as nuts, bolts, cable-ties and so on
4.
Publishing drawings of the products on your
website
11. Intellectual property comprises of how many forms?
A.
One
B.
Two
C.
Three
D.
Four
Ans: Two
12. Intellectual property refers to
A) New Creation
B) Modification of Existing things
C) A & B
D) None
Ans: New Creation
13. Literacy artistic work contains
A) Products
B) Drinks, Food etc
C) Music Books
etc
D) Software Apps etc
Ans: Music Books etc.
14. Literacy and artistic work
protected by
A) patent
B) Copyright
C) Trademark
D) Trade Secrets
Ans: Copyright
15. Industrial property describes
the
A) Domestic Purpose
B) Commercial
purpose
C) None
Ans: Commercial purpose
16. which of the following rights
represented by symbol?
A) trademark
B) copyright
C)
patents
D) All of the above
Ans: Trademark
17) If a person Ali wants to protect
his work then he should try for which type of law?
A) trademark
B) Copyright
C) Patent
D) Trade Secrets
Ans:
Copyright
18. Small Portion of copyright is
called:
A) Fair Use
B) Trade Secrets
C) Patents
D) None of the above
Ans: Fair Use
19. Formula of Coke is kept secret
by:
A) patent
B) Copyright
C) Trade secret
D) None
Ans: Trade secret
20. The 'apple' logo of the Apple
Corporation is an example of which of the following?
A) Patent
B) Copyright
C) trademark
D) trade secret
Ans: trademark
21Ali is an artist and want to protect his work then
what is best idea for protection his work?
- copyright
- geographical indications
- patents
- registered designs
- trademarks
22. Ahmed is an Web Designer how he can protect his
design?
- copyright
- geographical indications
- patents
- registered designs
- trademarks
- Usama
want to invent a new product in market, But how he can protect his idea
for new invention?
- copyright
- geographical indications
- patents
- registered designs
- trademarks
- Which
of these is a geographical indication?
- Bata
- Multan Mangoes
- Service Shoe
- Playstation
- World Wide Web
- What
does a trademark protect?
- an invention
- a work of art
- logos, names and brands
- the look, shape and feel of a
product
- a secret formula
- Ali
got a patent for his work, how much duration he have?
- 10 years
- 20 years
- 40 years
- 60 years
- Which of these works does the
right of attribution apply to:
- Computer programs
- Typefaces
- Databases
- Works created for the purpose
of reporting current events
- If someone want to protect his
work information then must be?
- It must have been recorded in
a material form
- It must not have been
previously made available to the public
- It must be of the right type
- It must be in the public
interest
- The law of confidence appear are different
due to the which concerns?
- The nature of an employee's
duties
- Considerations of public
policy
- Contract law
- All of the above
- The Community Unregistered
Right:
- Gives the same rights as a
registered design, but for a shorter duration
- Is different in that novelty
is assessed as at the date the design was created
- Provides an anti-copying right
- Lasts 5 years
31.
In
most countries, how long does copyright last for?
A.
10
years after the creation of the work
B.
50
years after the creation of the work
C.
10
years after the death of the person who created that work
D.
50 years after the death of the person who created that
work
32.
Which
one is not a copyright protection example?
a) A DVD
b) An unrecorded speech
c) Written
lyrics of a song
d) A hand
knitted jumper
33.
Which
of the following is not against to copyrights laws?
a)
To import copied CDs.
b)
To make a copy of a CD and sell it.
c)
To borrow a CD from a friend and copy it to your laptop for your own private
use.
d) To purchase a CD and copy it to your laptop for your own private
use.
34.
If
someone want to get a patent then which of the following must have?
a) Be a product.
b)
Be new to the public.
c)
Involve an inventive step.
d)
Be capable of industrial application.
35.
Ahmed
can get trademark in the following terms except?
a) The mark is
an image.
b) The mark is
made up of letters and numbers.
c) The mark is made
up of a symbol with no words or letters.
d) The mark represents the natural or technical shape of the
goods.
36.
The
govt fee for trademark is
A.
2500
B.
2000
C.
3000
D.
3500
37.
Copyright
duration for films and recordings:
A.
40
Years
B.
20
years
C.
50 years
D.
45
years
38.
Copyright
for typographical arrangement is
A.
40
years
B.
35
years
C.
38
years
D.
25 years
39.
How
many types of patents?
A.
One
B.
Two
C.
Three
D.
Four
40. Select
the true statement from the following?
a) A
patent must be registered in order to gain protection.
b) Copyright
must be registered in order to gain protection.
c) The owner of
a patent cannot sell it but can prevent others using his invention.
d) The definition
of an invention is set out in the Patents Act 1977.
1)
Intellectual
Property Rights (IPR) use to protect the information and ideas that are of
a. Ethical
value
b. Moral
value
c. Social
value
d. Commercial value
2)
The term ‘Intellectual Property Rights’ covers
a. Copyrights
b. Know-how
c. Trade dress
d. All of the above
3) Following cannot be exploited
by assigning/license the rights to another person.
a. Patents
b. Designs
c. Trademark
d. All of the above
4)
He is the following can be patented
a.
Machine
b.
Process
c.
Composition of matter
d.
All of the above
5)
Trade mark is --------------
a. is represented graphically
b. is capable of distinguishing
the goods / services of one person from those of another person
c. may include shapes of goods /
combination of color
d. All of the above
6)
The agreement that is enforceable by law is
known as
a.
Valid agreement
b.
Void agreement
c.
Illegal agreement
d.
Unenforceable agreement
7)
Which of the following is (are) included in
Geographical indications of Goods
a. Handicraft
b. Foodstuff
c. Manufactured
d. All of the above
8)
Which of the
following is not a category of copyright work in the CDPA?
a. Literary
works
b. Furniture
c. Sculpture
d. Musical
works
9)
Which of the
following statements is correct regarding artistic works?
a. All
work of art are protected as artistic works
b. Artistic
quality is irrelevant where copyright is
concerned
c. Only work listed
within the definition of artistic works
d. The
question of whether something is art / not is judged objectively
10) Intellectual
property rights and _______________ are two of the most important developing
areas of law.
a.
Cyber
law
b.
copyright
infringement
c.
patent law
d.
trademark
infringement
11) What
actions a person bring against someone who steals a trade secret of an
organization or individual ?
a. Economic
Espionage Act
b. Infringement
action
c. Misappropriation
d. Violation
of trademark law
12) To
get patent, an invention must be _______________.
a. non-obvious
b. useful
c. novel
d. all of the above
13) Who
can challenge the violations of a patent?
a. Business
competitors
b. The
inventor’s partners or employees
c. Anyone
d. Federal
government
14) Which
of the following can a successful plaintiff in a patent infringement suit not
recover?
a. Money
damages
b. Royalties for
the next ten years
c. Injunction
preventing future infringements
d. An
Order requiring the destruction of the infringing article
15) Commercial
use domain names will normally use the following suffix in their website
address.
a) .net
b) .govc
c) .com
d) .org
16) A
novel idea and invention involve in -----------
a.
Patent
b. Copyright
c. Trade
secret
d. Trademark
17) Expression
symbol or design include in ------------
a.
Trade
mark
b. Patent
c. Copyright
d. All
of above
18) ---------
law allows legal action against violators?
a.
Patent
b. Copyright
c. Trademark
d. None
of these
19) Protect
feature function or process embodied in instructions executed on a computer
comes under in?
a.
Software
patent
b. Patent
violation
c. Copyright
d. None
of these
20) Items
cannot be patented if they are ------------
a. Abstract
idea
b. Laws
of nature
c. Natural
phenomena
d.
All
of these
21) What protects the
intellectual property created by artists?
a. Copyright
b. Patents
c. registered designs
d. trademarks
22) What protects the
intellectual property created by designers?
a. Copyright
b. Patents
c. registered design
d. trademarks
23) What protects the
intellectual property created by inventors?
a. Copyright
b. Patents
c. registered designs
d. trademarks
24) What does a trademark
protect?
a. an invention
b. a work of art
c. logos, names and brands
d. a secret formula
25) How long do patents usually last for?
a. 10 years
b. 20 years
c. 40 years
d. 60 years
26) In most countries, how
long does copyright last for?
a. 10 years after the
creation of the product
b. 50 years after the
creation of the product
c. 10 years after the death
of the person who created that product
d. 50 years after the death of the person who created
that product
27) If a writer write an original story, what type of
intellectual property gives him the right to decide who can make and sell copies
of your work?
a. Copyright
b. geographical indications
c. patents
d. trademarks
28) Imagine a footballer create
his own company to sell his own range of clothes products. What type of
intellectual property can he use to show that the clothes products are made by
his Organization?
a. Copyright
b. Patents
c. registered design
d. trademarks
29) If a company develops a
new technology that improves its main product, what type of intellectual
property can they use to stop others from copying their innovation?
a. geographical indications
b. Patents
c. registered designs
d. trademarks
30) Which of these is a
geographical indication?
a. BMW
b. Champagne
c. Hogwarts
d. World Wide Web
31) Patent Act does not apply
to Ladakh Union Territory.
a. Yes
b. No
c. Kashmir has an independent Patent Act
32) “Exclusive license” means
a. a license
from a patentee which confers on the licensee
b. a license from the Patent
registrar
c. a license under Patent
Cooperation Treaty
d. none of above
33) “Invention” involves the
process steps
a. True
b. False
c. something different
34) Patent Cooperation
Treaty” means
a. Patent Cooperation Treaty signed at Washington
b. Patent Cooperation Treaty
signed at Davos
c. Patent Cooperation Treaty
signed at Singapore
35) Which one is not
inventions
a. an invention the primary / commercial
exploitation of which could be contrary public order
b. a method of agriculture
or horticulture
c. the topography of
integrated circuits
d. above all
36) What is not Patentable
a. A new assault gun
b. A new poison capable of
human death
c. A new chemical compound
for huge explosion
d. all above are patentable
37) Whether the assignee of a
true inventor can ask for Patent
a. Before patent assignee has no right to ask for
Patent
b. Assignment of an un-patented invention is
permissible under the law
c. assignment is not
permissible under the Patent act
38) India became a signatory to the Patent
Cooperation Treaty (PCT) in 1998
a. True
b. False
c. Signed but the treaty was
not implemented
39) “Legal representative”
means a person who in law represents the estate of a dead person
a. True
b. the power of attorney
holder also included in the proposition
c. False
40) If I own the copyright
over my work on TPT without taking extra steps like formal registration.
a. True
b. False
1)
3
2) 5
3)
6
4)
7
2: the person
responsible for the installation testing and support of the product is?
1)
contract administrater
2) test engineer
3)
test controller
4)
none
the fifth sub
process in the risk management process
1) risk response
2)
risk monitoring
and controlling
3)
Qualitative risk
analysis
4)
Quantitative risk analysis
The activities and data that allow information flow in a project
frequently computerized is
1)
PMID
2) PMIS
3)
PMOS
4)
PMOD
_____is the
associated with the Product Risk.
A.
Test object
B.
non-availability of the test environment
C. Negative
consequences
D. Control of
test item
one of the following factors affect the
probable consequences ?
A. Risk
timing
B. Contingency planning
C. Risk avoidance
D. Risk monitorin
__ is the
risk management most important jobs
1) Project team
2)
Production manager
3)
Inverter
4)
Developer
One of the
following is the risk management responsibility
1) Project team
2)
Production manager
3)
Developer
4)
Inverter
One of the
following ways to deal with a risk?
1)
Transfer
2)
Ignore
3)
Contingency
4) All
Mode Is used
to project risk factore
1)
Prototype model
2)
Waterfall model
3) Spiral model
4)
All
___ sratagies
means that the impact of the risk will be reduced
1) Minimize strategies
2)
Avoidance strategies
3)
Contingency strategies
4)
All
Re indicates
____
1)
Risk analysis
2) Risk exposure
3)
Risk evolution
4)
All
Risk is the
really want building an excellent
product or system
1)
Schedule
2) Business
3)
Techniques
4)
All
Most project
fails because of insufficient support of
1)
Project manager
2) Top manager
3)
Customer
4)
Developer
An alternate
approach to the check list is
1)
Event Analysis
2) Threat Analysis
3)
Operability Study
4)
All
Insurance is
best suited to risk with
- high frequency and low loss
severity.
- low
frequency and high loss severity.
- minimum frequency and no loss
severity.
- high frequency and high loss
severity
the risk
manager maybe able to identify the new venture involved in
- Pure
risk.
- Group Risk.
- Speculative risk.
- Particular risk
An instrument
by which a pure risk is transferred by a
party other than insure is
- Insurance
- Retention.
- Non
Insurance Transfer.
- Reinsurance
The person
whose risk is insured is called
- Insured
- merchandiser
- marketer
- Agent
The
possibility that actual result may differ from predicted result is known as
- Risk.
- Uncertainty.
- Peril.
- Hazards
The success
of whole process of risk management is depend on its
- Identification
- Risk analysis
- Assessment of risk
- Evaluation of risk
1.
The criteria that will be used to evaluate risk
should also be established and the structure of the analysis should be defined.
A)
Risk
identification.
B)
Establish context.
C)
Risk analysis
D)
All of above
2.
A strategy is designed to deflect as many
threats as possible in order to avoid the costly and disruptive consequences of
a damaging event.
B)
Manage Risk
C)
Risk
D)
None
3. How Many Steps of
the Risk Management Process
A) 4
B) 6
C) 5
D) 3
4.
Which
are the types of risks
A)
Business risk
B)
Non Business Risk
C)
Financial Risk
D)
All of above
5. The most important jobs for a risk management
A) Project manager
B)
Client
C)
Project Team
D)
Investor
6.
In software is being developed, Which of the
following risks are derived from the organizational environment.
A)
Managerial risks
B)
Technology
risks
C)
Estimation risks
D)
Organizational risks
7.
Risk management is now recognized as one of the
most important project management tasks.
A)
True
B)
False
8.
Which risks are associated with constraints
imposed by management?
A) Business impact risks
B) Process definition risks
C) Product size risks
D) Development environment risk
9.
Which of the following is not a business risk?
A) losing budgetary
B) software scope
C) change in people
D) one really wants
10. What threatens the viability of the software to be built?
A) Known risks
B) Business risks
C) Project risks
D) Technical risks
Efficiency in a software
product does not include___
1)
Responsiveness
2) Licensing
3)
Memory utilization
4)
Processing time
Company has latest
computers and state of the art software
tools, so we don’t worry about the quality of the product
1)
True
2) False
which of the items listed below is not one of the software
engineering layers?
1)
Process
2) Manufacturing
3)
Methods
4)
Tools
The reason for software bugs and failures is due to..
1)
Software companies
2)
Software developers
3) Both
4)
None
A most software
development projects are initiated to try meet some business need
1) True
2)
False
Which of these are the 5 generic software engineering framework
activities ?
1) Communication,planning,modeling,construction,deployment
2)
Communication , risk
management ,measurement ,production , reviewing
3)
Analysis,designing
,programming , debugging ,maintenance
4)
Analysis, planning ,
designing , programming , testing
Which of the following activities
is not part of the software reengineering process model?
1)
Forward engineering
2)
Inventory analysis
3) Prototyping
4)
Reverse engineering
Reverses engineering of data focus
on
1)
Database structure
2)
Internal data structure
3) Both
4)
None
Which of these is not
example of data restructuring ?
1) Data analysis
2)
Data name rationalization
3)
Data record standardization
4)
Non
The nature of software applications can be characterized by
their information
1)
Complexity
2)
Content
3) Both 2,4
4)
Determinacy
1. Sources of funds can be
A)
Grants
B)
Loans
C)
Sale of Equity
D)
All of the above
2.
A _____ is a sum of money
given to the company
A)
Grant
B)
Loans
C)
Sale
D)
None of the above
3.
GST is
a consumption of goods and service tax based on
A)
Development
B)
Destiny
C)
Destination
D)
Duration
4.
Finance functions are
A)
Raising of funds
B)
Planning of funds
C)
Allocation of resources
D)
All of the above
5.
A _______ is a sum of money
lent to the company
A)
GST
B)
Loan
C)
Investment
D)
None of the above
6.
______ is money paid to the
company in exchange for a share in the ownership of the company
A)
Loan
B)
Sales
C)
Equity capital
D)
Both A & B
7.
The
capital budget is associated with
A)
Long
terms and short terms assets
B)
Fixed
assets
C)
Long
terms assets
D)
Short
term assets
8.
A _______ is a prediction
of the future financial position of an organization
A)
Manager
B)
Owner
C)
Budget
D)
None of the above
9.
_______ is an iterative
process
A)
Working
B)
Managing
C)
Budgeting
D)
Project
10.
Accounting normally
operates on an _____ basis
A)
Accrual
B)
Daily
C)
Monthly
D)
Yearly
1) What is the basis purpose of financial management?
A) To minimise the risk
B) To maximise the
owner’s wealth
C) To maximise the return
D) To raise profit
2). In an organizatio the
finance manager is accountable for.
A) Earning capital assets of the company
B) Effective management of a fund
C) Arrangement of
financial resources
D) Proper utilisation of funds
3). The market value of a share is responsible for.
A) The investment
market
B) The government
C) Shareholders
D) The respective companies
4) Which of the following is associated with long terms assets.
A) Long terms and short terms assets
B) Fixed assets
C) capital budget
D) Short term assets
5. CAPM stands for.
a).Capital asset
printing model
B) Capital amount printing model.
C) Capital amount pricing model..
d) Capital asset
pricing model
6. What does financial leverage measure?
A) No change with EBIT and EPS
B) The sensibility of EBIT with % change with respect to
output
C) The sensibility of
EPS with % change in the EBIT level
D) % variation in the level of production
7)Select which are
the financial assets from the mentioned below items ?
A) Machines
B) Bonds
C) Stocks
D) B and C
8. consumption of goods and service tax based on Destination
is :
A) Development
B) Dividend
C) Destiny
D) GST
9. How you will definethe
concept of Financial management ?
A) Profit maximization
B) All features of
obtaining and using financial resources for company operations
c) Organization of funds
D) Effective Management of every company
10. Investment can be
defined as
A) Person’s dedication to purchasing a house or flat
B) Use of capital on
assets to receive returns
C) Usage of money on a production process of products and
services
D) Net additions made to the nation’s capital stocks
1-A
organization could not be successful for a length of time with out
1-Financial Managed
2-Time managed
3-Plan
4-Non
2-The first
step take in organization for raising money
1-business plan
2-Time manageing
3-Achieve gole
4-non
3-The source
of funds is
1-Grant
2-Loans
3-Sale of equity
4-All of these
4-------------of
a firm refers to the composition of its long term fund and its captal structure
1-Capitalisation
2-Over-Capitalisation
3-Under-Capitalisation
4-Market-Capitalisation
What are
different option other then cash used for distribution profit to shareholder
1-bonus share
2-Stock split
3-Stock purchase
4-All of these
6-when total
current asset exceed total current liabilities it refer to
1-GWC
2-TWC
3-Both GWC and TWC
4-NWC
7- THE Primary goal of financial management is--------
1-max the return
2-Max the wealth of owner
3-Max profit
4-Min the risk
8- capital budgeting is related to
1-long term asset
2-Short term asset
3-Long and short term asset
4-Fixed asset
--------------
is concerned with the maximization of firm stock price
1-shareholder wealth maximization
2-Profit maximization
3-Stakeholder wealth maximization
4-EPS maximization
The
---------- decision involves efficiently managing the asset o the balance sheet
day to day basis,especially current assets
1-asset management
2-Financing
3-Accounting
4-investment
No comments:
Post a Comment