Exam Details
Subject | cyber laws and security control | |
Paper | ||
Exam / Course | b.c.a | |
Department | ||
Organization | solapur university | |
Position | ||
Exam Date | December, 2018 | |
City, State | maharashtra, solapur |
Question Paper
B.C.A. (Semester VI) (CGPA) Examination Nov/Dec-2018
CYBER LAWS AND SECURITY CONTROL
Time: 2½ Hours Max. Marks: 70
Instructions: Q.1 and Q.7 are compulsory.
Attempt any two questions from Q. Q.3 and Q.4.
Attempt any one question from Q. 5 and Q.6.
Figures to the right indicate full marks.
Q.1 Choose the correct alternatives: 10
It is stealing ideas or creations of others.
Plagiarism Intellectual Property Rights
Piracy All of above
Information Technology Act in India is amended in
2000 2004
2008 2010
Firewalls are used to protect against
Data driven attack Fire attacks
Virus attacks Unauthorized access
The altering of data so that it is not usable unless the changes are
undone is
Compression Biometric
Encryption None of these
Authentication is
Modification Insertion
Identify user None of these
Which of the following is a cyber crime against individual?
Email spoofing Cyber Defamation
Cyber stalking All of above
backup all selected data.
Full Incremental
Copy None of these
Scope of e-commerce is
Global Local
Both a and b None of these
converted data from plain text to cipher text.
Decryption Encryption
Both a and b EDI
10) Linux is software.
Public Domain Freeware
Both a b All of above
Q.1 State true false. 04
Internet commerce cannot used for once-off transactions
Data means representation of facts instructions.
Only private key is used in digital certificate
Bugs mean software error.
Page 2 of 2
SLR-CH-13
Q.2 Explain information society. 05
Explain digital signature in detail. 05
Write a short on copy right 04
Q.3 What is back-up? Explain its types. 05
What is model law? Explain its scope objective. 05
Write a short note on information society 04
Q.4 What are the duties of subscriber of digital signature certificate? 05
What is e-commerce? Explain its application. 05
Short note on Cyber crime. 04
Q.5 Write a note on security aspects and contract aspect of cyber law. 07
Explain difference between intranet extranet security. 07
Q.6 Explain about encryption techniques differentiate between secret key
encryption public key encryption.
07
Explain information technology 2000. 07
Q.7 Write short notes on:
EDI 04
Security audit 04
Authentication 04
E-commerce
CYBER LAWS AND SECURITY CONTROL
Time: 2½ Hours Max. Marks: 70
Instructions: Q.1 and Q.7 are compulsory.
Attempt any two questions from Q. Q.3 and Q.4.
Attempt any one question from Q. 5 and Q.6.
Figures to the right indicate full marks.
Q.1 Choose the correct alternatives: 10
It is stealing ideas or creations of others.
Plagiarism Intellectual Property Rights
Piracy All of above
Information Technology Act in India is amended in
2000 2004
2008 2010
Firewalls are used to protect against
Data driven attack Fire attacks
Virus attacks Unauthorized access
The altering of data so that it is not usable unless the changes are
undone is
Compression Biometric
Encryption None of these
Authentication is
Modification Insertion
Identify user None of these
Which of the following is a cyber crime against individual?
Email spoofing Cyber Defamation
Cyber stalking All of above
backup all selected data.
Full Incremental
Copy None of these
Scope of e-commerce is
Global Local
Both a and b None of these
converted data from plain text to cipher text.
Decryption Encryption
Both a and b EDI
10) Linux is software.
Public Domain Freeware
Both a b All of above
Q.1 State true false. 04
Internet commerce cannot used for once-off transactions
Data means representation of facts instructions.
Only private key is used in digital certificate
Bugs mean software error.
Page 2 of 2
SLR-CH-13
Q.2 Explain information society. 05
Explain digital signature in detail. 05
Write a short on copy right 04
Q.3 What is back-up? Explain its types. 05
What is model law? Explain its scope objective. 05
Write a short note on information society 04
Q.4 What are the duties of subscriber of digital signature certificate? 05
What is e-commerce? Explain its application. 05
Short note on Cyber crime. 04
Q.5 Write a note on security aspects and contract aspect of cyber law. 07
Explain difference between intranet extranet security. 07
Q.6 Explain about encryption techniques differentiate between secret key
encryption public key encryption.
07
Explain information technology 2000. 07
Q.7 Write short notes on:
EDI 04
Security audit 04
Authentication 04
E-commerce
Other Question Papers
Subjects
- advance programming in c
- advanced java – i
- advanced java – ii
- advanced programming in ‘c’
- advanced web technology
- basics of ‘c’ programming
- business communication
- business statistics
- communication skills
- computer graphics
- computer oriented statistics
- core java
- cyber laws and security control
- data structure using ‘c’
- data structures using ‘c’
- data warehouse and data mining
- database management system
- dbms with oracle
- development of human skills
- digital electronics
- discrete mathematics
- e-commerce
- e-governance
- financial accounting with tally
- financial management
- fundamentals of computer
- fundamentals of financial accounting
- introduction to data mining & warehousing
- introduction to information technology
- linux and shell programming
- management information system
- networking & data communication
- networking and data communication
- object oriented programming with c++
- oop with c++
- operating system
- operations research
- operting system
- procedural programming through ‘c’
- python
- rdbms with oracle
- software engineering
- software project management
- software testing
- theory of computation
- visual programming
- web technology
- web technology – ii
- web technology – iii