Exam Details
Subject | it acts and cyber laws | |
Paper | ||
Exam / Course | bachelor of computer applications | |
Department | ||
Organization | Mizoram University | |
Position | ||
Exam Date | 2018 | |
City, State | mizoram, |
Question Paper
VI/BCA/6E4 Student's Copy
2 0 1 8
6th Semester
BACHELOR OF COMPUTER APPLICATIONS
Elective
Paper BCA-6E4
IT Act and Cyber Law
Full Marks 75
Time 3 hours
PART A—OBJECTIVE
Marks 25
The figures in the margin indicate full marks for the questions
SECTION—A
Marks 15
1. Tick the correct answer in the brackets provided 1×10=10
The Information Technology Act, 2000 came into force on
17th December, 2000
9th June, 2000
1st June, 2000
17th October, 2000
The Information Technology Amendment Act, 2008 has come into force
in
October 2008
January 2009
October 2009
None of the above
/551 1 Contd.
The Controller of Certifying Authorities works under
the Prime Ministers Office
the Reserve Bank of India
the Ministry of Communication and IT
the Autonomous Body
Which of the following is not an example of intellectual property?
QR code Trademarks
Copyright Patent
Which Act provides legal framework for e-governance in India?
Indian Penal Code
IT Amendment Act, 2008
IT Act, 2000
Cyber Law
Which Section of the IT Act deals with the legal recognition of
electronic records?
Section 4 Section 2
Section 5 Section 6
E-mail that appears to have been originated from one source when it
was actually sent from another source is termed as
e-mail bombing e-mail spoofing
e-mail spamming junk mail
The first cyber crime in Mizoram happened in
1998 2005
2009 2010
The explicit portrayal of sexual subject matter is termed as
ponagraphy pornography
sexual crime sexual harassing
Which agency made the investigation related to India's First Cyber
Crime Conviction?
Mumbai Police Chennai Police
CBI Kerala Police
VI/BCA/6E4/551 2 Contd.
2. State whether the following statements are True or False by putting
a Tick mark 1×5=5
The original term came from Greek. T F
Hacking Web server and taking control on another person's Web site is
called as Web hijacking. T F
The main purpose of the Data Protection Act is to increase the security
of computer systems. T F
Legal recognition of digital signatures is not a component of the IT
Act, 2000. T F
An example of intellectual property is copyright. T F
SECTION—B
Marks 10
Answer the following questions 2×5=10
1. What is data protection and privacy?
2. Define Online Dispute Resolution (ODR).
3. What is the main object and scope of the IT Act?
4. Distinguish between E-mail spoofing and E-mail bombing.
5. What is Digital Signature Certificate?
PART B—DESCRIPTIVE
Marks 50
The figures in the margin indicate full marks for the questions
1. Define Cyber Crimes and Cyber Law in the context of Indian
Cyber Law. 5
Write a short note on the evolution of cyber crime in India. 5
OR
Write the major needs of Cyber Laws for data protection and privacy. 5
Explain with suitable example about Web hijacking and Web
defamation. 5
VI/BCA/6E4/551 3 Contd.
2. Write a short note on the essence of digital contracts. 5
Write the punishment for Cyber Fraud, Cyber Pornography and
Intellectual Property Crimes under the IT Act. 5
OR
Explain the IT Act, 2000 and its major amendments. 5
Explain the certifying authorities and liabilities for law of digital
contracts. 5
3. Explain about copyright protection of content on the Internet. 5
Write any three Cyber Crimes and their punishments. 5
OR
Explain organizational issues and jurisdictional issues of Cyber Law. 5
Write the salient features of Law of Digital Contracts. 5
4. Explain e-governance with the major applicability of the IT Act. 5
Explain with example about denial of service attack. 5
OR
Explain about the ownership of copyright under the IT Act, 2000. 5
Write the major issues addressed by the IT Act, 2000. 5
5. Discuss about the License of Copyright. 5
Write the punishment under the IT Act, 2000. 5
OR
Write the major uses of electronic records and digital signatures in the
government and its agencies. 5
Define the following cyber crimes 1×5=5
Cyber stalking
Cyber terrorism
Salami attack
Online gambling
Cyber pornography
2 0 1 8
6th Semester
BACHELOR OF COMPUTER APPLICATIONS
Elective
Paper BCA-6E4
IT Act and Cyber Law
Full Marks 75
Time 3 hours
PART A—OBJECTIVE
Marks 25
The figures in the margin indicate full marks for the questions
SECTION—A
Marks 15
1. Tick the correct answer in the brackets provided 1×10=10
The Information Technology Act, 2000 came into force on
17th December, 2000
9th June, 2000
1st June, 2000
17th October, 2000
The Information Technology Amendment Act, 2008 has come into force
in
October 2008
January 2009
October 2009
None of the above
/551 1 Contd.
The Controller of Certifying Authorities works under
the Prime Ministers Office
the Reserve Bank of India
the Ministry of Communication and IT
the Autonomous Body
Which of the following is not an example of intellectual property?
QR code Trademarks
Copyright Patent
Which Act provides legal framework for e-governance in India?
Indian Penal Code
IT Amendment Act, 2008
IT Act, 2000
Cyber Law
Which Section of the IT Act deals with the legal recognition of
electronic records?
Section 4 Section 2
Section 5 Section 6
E-mail that appears to have been originated from one source when it
was actually sent from another source is termed as
e-mail bombing e-mail spoofing
e-mail spamming junk mail
The first cyber crime in Mizoram happened in
1998 2005
2009 2010
The explicit portrayal of sexual subject matter is termed as
ponagraphy pornography
sexual crime sexual harassing
Which agency made the investigation related to India's First Cyber
Crime Conviction?
Mumbai Police Chennai Police
CBI Kerala Police
VI/BCA/6E4/551 2 Contd.
2. State whether the following statements are True or False by putting
a Tick mark 1×5=5
The original term came from Greek. T F
Hacking Web server and taking control on another person's Web site is
called as Web hijacking. T F
The main purpose of the Data Protection Act is to increase the security
of computer systems. T F
Legal recognition of digital signatures is not a component of the IT
Act, 2000. T F
An example of intellectual property is copyright. T F
SECTION—B
Marks 10
Answer the following questions 2×5=10
1. What is data protection and privacy?
2. Define Online Dispute Resolution (ODR).
3. What is the main object and scope of the IT Act?
4. Distinguish between E-mail spoofing and E-mail bombing.
5. What is Digital Signature Certificate?
PART B—DESCRIPTIVE
Marks 50
The figures in the margin indicate full marks for the questions
1. Define Cyber Crimes and Cyber Law in the context of Indian
Cyber Law. 5
Write a short note on the evolution of cyber crime in India. 5
OR
Write the major needs of Cyber Laws for data protection and privacy. 5
Explain with suitable example about Web hijacking and Web
defamation. 5
VI/BCA/6E4/551 3 Contd.
2. Write a short note on the essence of digital contracts. 5
Write the punishment for Cyber Fraud, Cyber Pornography and
Intellectual Property Crimes under the IT Act. 5
OR
Explain the IT Act, 2000 and its major amendments. 5
Explain the certifying authorities and liabilities for law of digital
contracts. 5
3. Explain about copyright protection of content on the Internet. 5
Write any three Cyber Crimes and their punishments. 5
OR
Explain organizational issues and jurisdictional issues of Cyber Law. 5
Write the salient features of Law of Digital Contracts. 5
4. Explain e-governance with the major applicability of the IT Act. 5
Explain with example about denial of service attack. 5
OR
Explain about the ownership of copyright under the IT Act, 2000. 5
Write the major issues addressed by the IT Act, 2000. 5
5. Discuss about the License of Copyright. 5
Write the punishment under the IT Act, 2000. 5
OR
Write the major uses of electronic records and digital signatures in the
government and its agencies. 5
Define the following cyber crimes 1×5=5
Cyber stalking
Cyber terrorism
Salami attack
Online gambling
Cyber pornography
Other Question Papers
Subjects
- accounting and financial management
- analysis and design of algorithms
- artificial intelligence
- assembly language programming
- c++ programming
- computer graphics and multimedia
- computer network security
- computer networking
- computer organization and architecture
- data mining and warehousing
- data structure using c
- database management systems
- digital computer fundamentals
- english language & communication skills
- environment and ecology
- fundamentals of tcp/ip
- gui programming
- internet and e-commerce
- introduction to computer architecture and organisation
- introduction to e-governance
- introduction to information technology
- introduction to java programming
- introduction to programming language through c
- it acts and cyber laws
- java programming
- management information systems
- mathematics – iii (numerical analysis)
- mathematics –ii (discrete mathematics)
- mathematics-i (bridge course)
- microprocessors
- networking—i
- object oriented programming in c++
- operating systems
- operation research
- oracle laboratory
- pc applications and internet technology
- personality and soft skills development
- programming in c
- programming language through c
- programming with vb 2010 with mini project
- project work
- quality management and control
- simulation and modeling
- software engineering
- software project management
- system analysis and design
- tally erp 9.0
- theory of computing
- unix and shell programming