Exam Details
Subject | cyber laws and security control | |
Paper | ||
Exam / Course | b.c.a | |
Department | ||
Organization | solapur university | |
Position | ||
Exam Date | March, 2018 | |
City, State | maharashtra, solapur |
Question Paper
B.C.A. (Semester VI) (CGPA) Examination Mar/Apr-2018
CYBER LAWS AND SECURITY CONTROL
Time: 2½ Hours
Max. Marks: 70
Instructions: Q.1 and Q.7 are compulsory. Attempt any two questions from Q. Q.3 and Q.4. Attempt any one question from Q. 5 and Q.6. Figures to the right indicate full marks.
Q.1
Choose the correct alternatives:
10
It is stealing ideas or creations of others.
Plagiarism
Intellectual Property Rights
Piracy
All of above
As per IT act cannot be in electronic form.
form
license
cheques
records
Firewalls are used to protect against
Data driven attack
Fire attacks
Virus attacks
Unauthorized access
Super market uses transaction with their suppliers.
E-market
EDI
Internet
None of these
Authentication is
Modification
Insertion
Identify user
None of these
is a contract between the purchaser publisher of the software?
License
Copy right
Cyber law
IT Act.
backup all selected data.
Full
Incremental
Copy
None of these
Scope of e-commerce is
Global
Local
Both a and b
None of these
converted data from plain text to cipher text.
Decryption
Encryption
Both a and b
EDI
10) A is a process of making copies of data so that these additional copies may be used to restore the original data.
Backup
Crime
Security
All of above
Q.1
Answer in one sentence:-
04
What is mean by theft?
What is mean by UNCITRAL?
What is mean by license?
What is mean by information?
Page 2 of 2
SLR-CV-18
Q.2
Explain digital signature in detail.
05
Explain information society.
05
Write a short on cyber crime.
04
Q.3
What are the duties of subscriber of digital signature certificate?
05
Explain UNCITRAL law in detail.
05
Write a short note on data protection.
04
Q.4
Explain hardware software security.
05
Explain benefits of EDI.
05
Short note on data encryption.
04
Q.5
What is cyber law? Explain intellectual property aspects.
07
Explain difference between Authentication and Authorization.
07
Q.6
Explain about encryption techniques and differentiate between secret key encryption public key encryption.
07
Explain information technology 2000.
07
Q.7
Write short notes on:
Copyright
04
Security audit
04
Data backup
04
Indian economy
02
CYBER LAWS AND SECURITY CONTROL
Time: 2½ Hours
Max. Marks: 70
Instructions: Q.1 and Q.7 are compulsory. Attempt any two questions from Q. Q.3 and Q.4. Attempt any one question from Q. 5 and Q.6. Figures to the right indicate full marks.
Q.1
Choose the correct alternatives:
10
It is stealing ideas or creations of others.
Plagiarism
Intellectual Property Rights
Piracy
All of above
As per IT act cannot be in electronic form.
form
license
cheques
records
Firewalls are used to protect against
Data driven attack
Fire attacks
Virus attacks
Unauthorized access
Super market uses transaction with their suppliers.
E-market
EDI
Internet
None of these
Authentication is
Modification
Insertion
Identify user
None of these
is a contract between the purchaser publisher of the software?
License
Copy right
Cyber law
IT Act.
backup all selected data.
Full
Incremental
Copy
None of these
Scope of e-commerce is
Global
Local
Both a and b
None of these
converted data from plain text to cipher text.
Decryption
Encryption
Both a and b
EDI
10) A is a process of making copies of data so that these additional copies may be used to restore the original data.
Backup
Crime
Security
All of above
Q.1
Answer in one sentence:-
04
What is mean by theft?
What is mean by UNCITRAL?
What is mean by license?
What is mean by information?
Page 2 of 2
SLR-CV-18
Q.2
Explain digital signature in detail.
05
Explain information society.
05
Write a short on cyber crime.
04
Q.3
What are the duties of subscriber of digital signature certificate?
05
Explain UNCITRAL law in detail.
05
Write a short note on data protection.
04
Q.4
Explain hardware software security.
05
Explain benefits of EDI.
05
Short note on data encryption.
04
Q.5
What is cyber law? Explain intellectual property aspects.
07
Explain difference between Authentication and Authorization.
07
Q.6
Explain about encryption techniques and differentiate between secret key encryption public key encryption.
07
Explain information technology 2000.
07
Q.7
Write short notes on:
Copyright
04
Security audit
04
Data backup
04
Indian economy
02
Other Question Papers
Subjects
- advance programming in c
- advanced java – i
- advanced java – ii
- advanced programming in ‘c’
- advanced web technology
- basics of ‘c’ programming
- business communication
- business statistics
- communication skills
- computer graphics
- computer oriented statistics
- core java
- cyber laws and security control
- data structure using ‘c’
- data structures using ‘c’
- data warehouse and data mining
- database management system
- dbms with oracle
- development of human skills
- digital electronics
- discrete mathematics
- e-commerce
- e-governance
- financial accounting with tally
- financial management
- fundamentals of computer
- fundamentals of financial accounting
- introduction to data mining & warehousing
- introduction to information technology
- linux and shell programming
- management information system
- networking & data communication
- networking and data communication
- object oriented programming with c++
- oop with c++
- operating system
- operations research
- operting system
- procedural programming through ‘c’
- python
- rdbms with oracle
- software engineering
- software project management
- software testing
- theory of computation
- visual programming
- web technology
- web technology – ii
- web technology – iii