Balbharati Maharashtra State Board Class 11 Information Technology Important Questions Chapter 4 Cyber Law Important Questions and Answers.
Maharashtra State Board 11th Information Technology Important Questions Chapter 4 Cyber Law
1. Fill in the Blanks.
Question 1.
__________ is the area of law that deals with the Internet’s relationship to technological and electronic elements.
Answer:
Cyberlaw
Question 2.
__________ is the part of the overall legal system that deals with the Internet, cyberspace, and their respective legal issues.
Answer:
Cyberlaw
Question 3.
__________ covers a fairly broad area, encompassing several subtopics including freedom of expression, access to and usage of the Internet, and online privacy.
Answer:
Cyberlaw
Question 4.
The attempts to change outdated laws and provides ways to deal with cybercrimes.
Answer:
Information Technology Act 2000
Question 5.
The Act offers the much-needed legal framework so that information is not denied.
Answer:
Information Technology
Question 6.
The Act has also proposed a legal framework for the authentication and origin of an electronic records.
Answer:
Information Technology
Question 7.
__________ is also called moral philosophy is the discipline concerned with what is morally good and bad, right or wrong.
Answer:
Ethics
Question 8.
__________ is the standards of behaviour; principles of right and wrong behaviour.
Answer:
Morals
Question 9.
Thus __________ are dictated by society, culture or religion.
Answer:
Morals
Question 10.
Computer Crime is alternatively referred to as __________
Answer:
Cybercrime
Question 11.
Computer crime is an act performed by a knowledgeable computer user, sometimes referred to as a __________
Answer:
Hacker
Question 12.
A __________ who illegally browses or steals a company’s or individual’s private information.
Answer:
Hacker
Question 13.
__________ can involve criminal activities that are traditional in nature, such as theft, fraud, forgery, defamation and mischief.
Answer:
Cybercrimes
Question 14.
__________ is nothing but copyright violation of software created originally by an individual or an institution.
Answer:
Software piracy
Question 15.
__________ includes stealing of codes/programs and other information illegally and creating the imitated copy by unauthorized means.
Answer:
Software piracy
Question 16.
Gaining access without the users’ permission is known as __________
Answer:
Unauthorized Access
Question 17.
__________ means granting access rights to resources.
Answer:
Authorization
Question 18.
A __________ is a legal right that gives the creator of a literary, artistic, musical, or other creative work.
Answer:
Copyright
Question 19.
__________ owners have the right to control the reproduction of their work, including the right to receive the royalty payment for that reproduction.
Answer:
Copyright
Question 20.
Activity such as decipher codes or passwords and breaking security systems for illegal reasons is called __________
Answer:
Cracking
Question 21.
The cracker will use a program or script known as a __________
Answer:
Crack
Question 22.
__________ is a criminal practice where an individual uses the Internet to systematically harass or threaten someone.
Answer:
Cyberstalking
Question 23.
__________ is a technique of extracting confidential information such as credit card numbers and username password combos by pretending as a legal enterprise.
Answer:
Phishing
Question 24.
__________ is typically carried out by email spoofing.
Answer:
Phishing
Question 25.
__________ is presenting someone else’s work or idea as your own without their consent.
Answer:
Plagarism
Question 26.
__________ refers to unauthorised intrusion into a computer or a network.
Answer:
Hacking
Question 27.
__________ is a person intensely interested in the deep and hidden or concealed working of any computer operating system and programming language.
Answer:
Hacker
Question 28.
__________ is a method of converting the original message into random text.
Answer:
Encryption
Question 29.
Full form of SSL is __________
Answer:
Secure Socket Layer
Question 30.
Through the __________, transmission of data is encrypted.
Answer:
Secure Socket Layer
Question 31.
__________ refers to a network security (Hardware and Software) system which blocks certain types of information.
Answer:
Firewall
Question 32.
__________ is an Act to provide legal recognition for transactions carried out by means of electronic data interchange and other means of electronic communication.
Answer:
Information Technology Act, 2000
Question 33.
__________ aims to provide the legal infrastructure for E-Commerce in India.
Answer:
Information Technology Act, 2000
Question 34.
The __________ have a major impact on E-Businesses and the new economy in India.
Answer:
Cyber laws
Question 35.
The __________ also aims to provide for the legal framework.
Answer:
Information Technology Act, 2000
Question 36.
__________ has been replaced with the electronic signature to make it a more technology-neutral act.
Answer:
Digital Signature
2. True or False.
Question 1.
Criminal Law is the area of law that deals with the Internet’s relationship to technological and electronic elements.
Answer:
False
Question 2.
Cyberlaw is the part of the overall legal system that deals with the Internet, cyberspace, and their respective legal issues.
Answer:
True
Question 3.
Cyberlaw covers a fairly broad area, encompassing several subtopics including freedom of expression, access to and usage of the Internet, and online privacy.
Answer:
True
Question 4.
The Information Technology Act 2000 attempts to change outdated laws and provides ways to deal with cybercrimes.
Answer:
True
Question 5.
The Information Technology Act offers the much-needed legal framework so that information is not denied.
Answer:
True
Question 6.
The Computer Act has also proposed a legal framework for the authentication and origin of an electronic records.
Answer:
False
Question 7.
Morals are also called moral philosophy is the discipline concerned with what is morally good and bad, right or wrong.
Answer:
False
Question 8.
Ethics is the standards of behaviour; principles of right and wrong behaviour.
Answer:
False
Question 9.
Thus Morals are dictated by society, culture, or religion.
Answer:
True
Question 10.
Computer Crime is alternatively referred to as Hacker.
Answer:
False
Question 11.
Computer crime is an act performed by a knowledgeable computer user, sometimes referred to as a Hacker.
Answer:
True
Question 12.
A Cybercrime who illegally browses or steals a company’s or individual’s private information.
Answer:
False
Question 13.
Cybercrimes can involve criminal activities that are traditional in nature, such as theft, fraud, forgery, defamation, and mischief.
Answer:
True
Question 14.
Software piracy is nothing but copyright violation of software created originally by an individual or an institution.
Answer:
True
Question 15.
Unauthorized access includes stealing of codes/programs and other information illegally and creating the imitated copy by unauthorized means.
Answer:
False
Question 16.
Gaining access without the user’s permission is known as Software piracy.
Answer:
False
Question 17.
Authorization means granting access rights to resources.
Answer:
True
Question 18.
Cracking is a legal right that gives the creator of a literary, artistic, musical, or other creative work.
Answer:
False
Question 19.
Copyright owners have the right to control the reproduction of their work, including the right to receive the royalty payment for that reproduction.
Answer:
True
Question 20.
Activity such as decipher codes or passwords and breaking security systems for illegal reasons is called copyright.
Answer:
False
Question 21.
The cracker will use a program or script known as a Crack.
Answer:
True
Question 22.
Cyberstalking is a criminal practice where an individual uses the Internet to systematically harass or threaten someone.
Answer:
True
Question 23.
Phishing is a technique of extracting confidential information such as credit card numbers and username password combos by pretending as a legal enterprise.
Answer:
True
Question 24.
Phishing is typically carried out by email spoofing.
Answer:
True
Question 25.
Plagiarism is presenting someone else’s work or idea as your own without their consent.
Answer:
True
Question 26.
Hacking refers to unauthorized intrusion into a computer or a network.
Answer:
True
Question 27.
Hacker is a person intensely interested in the deep and hidden or concealed working of any computer operating system and programming language.
Answer:
True
Question 28.
Encryption is a method of converting the original message into random text.
Answer:
True
Question 29.
The full form of SSL is Secure Socket Layer.
Answer:
True
Question 30.
Through the Encryption transmission of data is encrypted.
Answer:
False
Question 31.
Encryption refers to a network security (Hardware and Software) system which blocks certain types of information.
Answer:
False
Question 32.
A digital signature is an Act to provide legal recognition for transactions carried out by means of electronic data interchange and other means of electronic communication.
Answer:
False
Question 33.
Information Technology Act, 2000 aims to provide the legal infrastructure for E-Commerce in India.
Answer:
True
Question 34.
Cyber laws have a major impact on E-Businesses and the new economy in India.
Answer:
True
Question 35.
The Information Technology Act, 2000 also aims to provide for the legal framework.
Answer:
True
Question 36.
Cyber laws have been replaced with electronic signatures to make it a more technology-neutral act.
Answer:
False
3. Multiple Choice Question (Single Choice)
Question 1.
__________ is the area of law that deals with the Internet’s relationship to technological and electronic elements.
(A) Cyberlaw
(B) Criminal Law
(C) Business Law
(D) Internet Law
Answer:
(A) Cyberlaw
Question 2.
__________ is the part of the overall legal system that deals with the Internet, cyberspace, and their respective legal issues.
(A) Cyberlaw
(B) Criminal Law
(C) Business Law
(D) Internet Law
Answer:
(A) Cyberlaw
Question 3.
__________ covers a fairly broad area, encompassing several subtopics including freedom of expression, access to and usage of the Internet, and online privacy.
(A) Cyberlaw
(B) Criminal Law
(C) Business Law
(D) Internet Law
Answer:
(A) Cyberlaw
Question 4.
The __________ attempts to change outdated laws and provides ways to deal with cybercrimes.
(A) Information Technology Act 2000
(B) Cyber Rule
(C) Computer Act
(D) Legal Act
Answer:
(A) Information Technology Act 2000
Question 5.
The __________ Act offers the much-needed legal framework so that information is not denied.
(A) Cyber Rule
(B) Information Technology
(C) Computer Act
(D) Legal Act
Answer:
(B) Information Technology
Question 6.
The __________ Act has also proposed a legal framework for the authentication and origin of an electronic records.
(A) Cyber Rule
(B) Information Technology
(C) Computer Act
(D) Legal Act
Answer:
(B) Information Technology
Question 7.
__________ is also called moral philosophy is the discipline concerned with what is morally good and bad, right or wrong.
(A) Ethics
(B) Morals
(C) Society
(D) Culture
Answer:
(A) Ethics
Question 8.
__________ is the standards of behaviour; principles of right and wrong behaviour.
(A) Ethics
(B) Morals
(C) Society
(D) Culture
Answer:
(B) Morals
Question 9.
Thus __________ are dictated by society, culture or religion.
(A) Ethics
(B) Morals
(C) Society
(D) Culture
Answer:
(B) Morals
Question 10.
Computer Crime is alternatively referred to as __________
(A) Cybercrime
(B) Hacker
(C) Computer crime
(D) Illegal Act
Answer:
(A) Cybercrime
Question 11.
Computer crime is an act performed by a knowledgeable computer user, sometimes referred to as a __________
(A) Cybercrime
(B) Hacker
(C) Computer crime
(D) Illegal Act
Answer:
(B) Hacker
Question 12.
A __________ who illegally browses or steals a company’s or individual’s private information.
(A) Cybercrime
(B) Hacker
(C) Computer crime
(D) Illegal Act
Answer:
(B) Hacker
Question 13.
__________ can involve criminal activities that are traditional in nature, such as theft, fraud, forgery, defamation, and mischief.
(A) Cybercrimes
(B) Hacker
(C) Computer crime
(D) Illegal Act
Answer:
(A) Cybercrimes
Question 14.
__________ is nothing but copyright violation of software created originally by an individual or an institution.
(A) Software piracy
(B) Unauthorized access
(C) Authorization
(D) Copyright
Answer:
(A) Software piracy
Question 15.
__________ includes stealing of codes/programs and other information illegally and creating the imitated copy by unauthorized means.
(A) Software piracy
(B) Unauthorized access
(C) Authorization
(D) Copyright
Answer:
(A) Software piracy
Question 16.
Gaining access without the users’ permission is known as __________
(A) Software piracy
(B) Unauthorized access
(C) Authorization
(D) Copyright
Answer:
(B) Unauthorized access
Question 17.
__________ means granting access rights to resources.
(A) Software piracy
(B) Unauthorized access
(C) Authorization
(D) Copyright
Answer:
(C) Authorization
Question 18.
A __________ is a legal right that gives the creator of a literary, artistic, musical, or other creative work.
(A) Software piracy
(B) Unauthorized access
(C) Authorization
(D) Copyright
Answer:
(D) Copyright
Question 19.
__________ owners have the right to control the reproduction of their work, including the right to receive the royalty payment for that reproduction.
(A) Software piracy
(B) Unauthorized access
(C) Authorization
(D) Copyright
Answer:
(D) Copyright
Question 20.
Activity such as decipher codes or passwords and breaking security systems for illegal reasons is called __________
(A) Cracking
(B) Crack
(C) Cyberstalking
(D) Phishing
Answer:
(A) Cracking
Question 21.
The cracker will use a program or script known as a __________
(A) Cracking
(B) Crack
(C) Cyberstalking
(D) Phishing
Answer:
(B) Crack
Question 22.
__________ is a criminal practice where an individual uses the Internet to systematically harass or threaten someone.
(A) Cracking
(B) Crack
(C) Cyberstalking
(D) Phishing
Answer:
(C) Cyberstalking
Question 23.
__________ is a technique of extracting confidential information such as credit card numbers and username password combos by pretending as a legal enterprise.
(A) Cracking
(B) Crack
(C) Cyberstalking
(D) Phishing
Answer:
(D) Phishing
Question 24.
__________ is typically carried out by email spoofing.
(A) Cracking
(B) Crack
(C) Cyberstalking
(D) Phishing
Answer:
(D) Phishing
Question 25.
__________ is presenting someone else’s work or idea as your own without their consent.
(A) Plagiarism
(B) Hacking
(C) Hacker
(D) A. Cracking
Answer:
(A) Plagarism
Question 26.
__________ refers to unauthorised intrusion into a computer or a network.
(A) Plagiarism
(B) Hacking
(C) Hacker
(D) Cracking
Answer:
(B) Hacking
Question 27.
__________ is a person intensely interested in the deep and hidden or concealed working of any computer operating system and programming language.
(A) Plagiarism
(B) Hacking
(C) Hacker
(D) Cracking
Answer:
(C) Hacker
Question 28.
__________ is a method of converting the original message into random text.
(A) Encryption
(B) Secure Socket Layer
(C) Firewall
(D) Hardware
Answer:
(A) Encryption
Question 29.
Full form of SSL is __________
(A) Secure Socket Layer
(B) Secure Switch Layer
(C) Secure Session Lesson
(D) System Secure Layer
Answer:
(A) Secure Socket Layer
Question 30.
Through the __________, transmission of data is encrypted.
(A) Secure Socket Layer
(B) Secure Switch Layer
(C) Secure Session Lesson
(D) System Secure Layer
Answer:
(A) Secure Socket Layer
Question 31.
__________ refers to a network security (Hardware and Software) system which blocks certain types of information.
(A) Encryption
(B) Secure Socket Layer
(C) Firewall
(D) Hardware
Answer:
(C) Firewall
Question 32.
__________ is an Act to provide legal recognition for transactions carried out by means of electronic data interchange and other means of electronic communication.
(A) Information Technology Act, 2000
(B) Cyber laws
(C) Digital Signature
(D) Digital Certificate
Answer:
(A) Information Technology Act, 2000
Question 33.
__________ aims to provide the legal infrastructure for e-commerce in India.
(A) Information Technology Act, 2000
(B) Cyber laws
(C) Digital signature
(D) Digital Certificate
Answer:
(A) Information Technology Act, 2000
Question 34.
The __________ have a major impact on E-Businesses and the new economy in India.
(A) Information Technology Act, 2000
(B) Cyber Laws
(C) Digital signature
(D) Digital Certificate
Answer:
(B) Cyber Laws
Question 35.
The also aims to provide for the legal framework.
(A) Information Technology Act, 2000
(B) Cyber Laws
(C) Digital signature
(D) Digital Certificate
Answer:
(A) Information Technology Act, 2000
Question 36.
__________ has been replaced with the electronic signature to make it a more technology-neutral act.
(A) Information Technology Act, 2000
(B) Cyber laws
(C) Digital Signature
(D) Digital Certificate
Answer:
(C) Digital Signature
4. Multiple Choice Two Correct Answers.
Question 1.
The Information Technology Act 2000 attempts to change outdated __________ and provides ways to deal with __________
(A) Authentication
(B) Laws
(C) Electronic record
(D) Cybercrimes
(E) Morals
Answer:
(B) Laws, (D) Cybercrimes
Question 2.
The Information Technology Act has also proposed a legal framework for the __________ and origin of __________
(A) Authentication
(B) Laws
(C) Electronic record
(D) Cybercrimes
(E) Morals
Answer:
(A) Authentication, (C) Electronic record
Question 3.
Thus __________ are dictated by society, culture or religion while __________ are chosen by the person himself which governs his life.
(A) Authentication
(B) Laws
(C) Electronic record
(D) Morals
(E) Ethics
Answer:
(D) Morals, (E) Ethics
Question 4.
Hacker is a person intensely interested in the deep and hidden or concealed working of any computer __________ and __________
(A) Operating System
(B) Programming Language
(C) Individual
(D) Institution
(E) Passwords
Answer:
(A) Operating System, (B) Programming Language
Question 5.
Software piracy is nothing but copyright violation of software created originally by an __________ or an __________
(A) Operating system
(B) Programming language
(C) Individual
(D) Institution
(E) Passwords
Answer:
(C) Individual, (D) Institution
Question 6.
Activity such as __________ or __________ and breaking security systems for illegal reasons is called cracking.
(A) Operating system
(B) Programming language
(C) Individual
(D) Decipher Codes
(E) Passwords
Answer:
(D) Decipher Codes, (E) Passwords
Question 7.
Phishing is a technique of extracting confidential information such as __________ and __________ combos by pretending as a legal enterprise.
(A) Computer
(B) Credit Card Numbers
(C) Network
(D) Username Password
(E) Programming Language
Answer:
(B) Credit Card Numbers, (D) Username Password
Question 8.
Hacking refers to unauthorised intrusion into a __________ or a __________
(A) Computer
(B) Credit Card Numbers
(C) Network
(D) Username Password
(E) Programming Language
Answer:
(A) Computer, (C) Network
Question 9.
Hacker is a person intensely interested in the deep and hidden or concealed working of any computer __________ and __________
(A) Operating system
(B) Programming language
(C) Individual
(D) Decipher Codes
(E) Passwords
Answer:
(A) Operating system, (B) Programming language
Question 10.
Encryption is a method of converting the __________ message into __________ text.
(A) Original
(B) Random
(C) Hardware
(D) Software
(E) Electronic communication
Answer:
(A) Original, (B) Random
Question 11.
Firewall refers to network security __________ and __________ system which blocks certain type of information.
(A) Original
(B) Random
(C) Hardware
(D) Software
(E) Electronic communication
Answer:
(C) Hardware, (D) Software
Question 12.
Information Technology Act, 2000 is an Act to provide legal recognition for transaction carried out by means of __________ and other means of __________
(A) Original
(B) Random
(C) Hardware
(D) Electronic Data Interchange
(E) Electronic Communication
Answer:
(D) Electronic Data Interchange, (E) Electronic Communication
Question 13.
Information Technology Act, 2000 aims to provide the __________ infrastructure for __________ in India.
(A) Legal
(B) E-Commerce
(C) Original
(D) Random
(E) Hardware
Answer:
(A) Legal, (B) E-Commerce
5. Multiple Choice Three Correct Answers.
Question 1.
Cyberlaw is the area of law that deals with the Internet’s relationship to technological and electronic elements, including computers, __________, __________ and __________
(A) Software
(B) Internet
(C) Hardware
(D) Legal Issues
(E) Information Systems
Answer:
(A) Software, (C) Hardware, (E) Information Systems
Question 2.
Cyberlaw is the part of the overall legal system that deals with the __________, __________, and their respective __________
(A) Software
(B) Internet
(C) Cyberspace
(D) Legal Issues
(E) Information Systems
Answer:
(B) Internet, (C) Cyberspace, (D) Legal Issues
Question 3.
Cyber lawcoversafairlybroadarea,encompassingseveralsubtopicsincluding __________, access to and __________, and __________
(A) Freedom of expression
(B) Usage of the Internet
(C) Online privacy
(D) Electronic Crime
(E) Hi-Tech Crime
Answer:
(A) Freedom of expression, (B) Usage of the Internet, (C) Online privacy
Question 4.
Computer Crime is alternatively referred to as __________, __________ or __________
(A) Freedom of expression
(B) Usage of the Internet
(C) Cybercrime
(D) Electronic Crime
(E) Hi-Tech Crime
Answer:
(C) Cybercrime, (D) Electronic Crime, (E) Hi-Tech Crime
Question 5.
Activity such as __________ codes or __________ and breaking __________ systems for illegal reasons is called cracking.
(A) Cyber Cafe
(B) Decipher
(C) Cyber Security
(D) Passwords
(E) Security
Answer:
(B) Decipher, (D) Passwords, (E) Security
Question 6.
The IT Act 2000 was amended in 2008 and 2011 and it includes rules for __________, __________, __________ by service provider, Audit of electronic document etc.
(A) Cyber Cafe
(B) Decipher
(C) Cyber Security
(D) Delivery of Services
(E) Security
Answer:
(A) Cyber Cafe, (C) Cyber Security, (D) Delivery of Services
6. Match the following.
Question 1.
Column ‘A’ | Column ‘B’ |
(1) Ethics | (A) Computer Crime |
(2) Morals | (B) Principles of right and wrong |
(3) Cyber Crime | (C) Moral philosophy |
(4) Hacker | (D) Illegally browses or steals a company’s or individual’s private information |
Answer:
Column ‘A’ | Column ‘B’ |
(1) Ethics | (C) Moral philosophy |
(2) Morals | (B) Principles of right and wrong |
(3) Cyber Crime | (A) Computer Crime |
(4) Hacker | (D) Illegally browses or steals a company’s or individual’s private information |
Question 2.
Column ‘A’ | Column ‘B’ |
(1) Software Piracy | (A) Legal right |
(2) Unauthorized access | (B) Gaining access without the users’ permission |
(3) Authorization | (C) Granting access rights to resources |
(4) Copyright | (D) Copyright violation of software |
Answer:
Column ‘A’ | Column ‘B’ |
(1) Software Piracy | (D) Copyright violation of software |
(2) Unauthorized access | (B) Gaining access without the users’ permission |
(3) Authorization | (C) Granting access rights to resources |
(4) Copyright | (A) Legal right |
Question 3.
Column ‘A’ | Column ‘B’ |
(1) Copyright owners | (A) Have the right to control the reproduction of their work |
(2) Cracking | (B) Will use a program or script known as a crack |
(3) Cracker | (C) Breaking security systems for illegal reasons |
(4) Cyberstalking | (D) Uses the Internet to systematically harass or threaten someone |
Answer:
Column ‘A’ | Column ‘B’ |
(1) Copyright owners | (A) Have the right to control the reproduction of their work |
(2) Cracking | (C) Breaking security systems for illegal reasons |
(3) Cracker | (B) Will use a program or script known as a crack |
(4) Cyberstalking | (D) Uses the Internet to systematically harass or threaten someone |
Question 4.
Column ‘A’ | Column ‘B’ |
(1) Phishing | (A) Technique of extracting confidential information |
(2) Plagiarism | (B) Presenting someone else’s work or idea as your own without their consent |
(3) Hacking | (C) Safe and responsible use of information and communication technology |
(4) Cyber Safety | (D) Refers to unauthorized intrusion into a computer or a network |
Answer:
Column ‘A’ | Column ‘B’ |
(1) Phishing | (A) Technique of extracting confidential information |
(2) Plagiarism | (B) Presenting someone else’s work or idea as your own without their consent |
(3) Hacking | (D) Refers to unauthorized intrusion into a computer or a network |
(4) Cyber Safety | (C) Safe and responsible use of information and communication technology |
Question 5.
Column ‘A’ | Column ‘B’ |
(1) Netiquette | (A) Network Security |
(2) Encryption | (B) Method of converting the original message into random text |
(3) Secure Socket Layer | (C) Transmission of data is encrypted |
(4) Firewall | (D) Internet etiquette |
Answer:
Column ‘A’ | Column ‘B’ |
(1) Netiquette | (D) Internet etiquette |
(2) Encryption | (B) Method of converting the original message into random text |
(3) Secure Socket Layer | (C) Transmission of data is encrypted |
(4) Firewall | (A) Network Security |
Question 6.
Column ‘A’ | Column ‘B’ |
(1) IT Act 2000 | (A) Provide legal recognition for transactions carried out by means of electronic data interchange |
(2) Digital Signature | (B) Electronic Signature |
Answer:
Column ‘A’ | Column ‘B’ |
(1) IT Act 2000 | (A) Provide legal recognition for transactions carried out by means of electronic data interchange |
(2) Digital Signature | (B) Electronic Signature |
7. Answer Briefly.
Question 1.
What is Cyber Law?
Answer:
- Cyberlaw is the area of law that deals with the Internet’s relationship to technological and electronic elements.
- Cyberlaw is the part of the overall legal system that deals with the Internet, cyberspace, and their respective legal issues.
- Cyberlaw covers a fairly broad area, encompassing several subtopics including freedom of expression, access to and usage of the Internet, and online privacy
Question 2.
State the advantages of Cyber Law.
Answer:
- The Information Technology Act 2000 attempts to change outdated laws and provides ways to deal with cybercrimes.
- The Information Technology Act offers the much-needed legal framework so that information is not denied.
- The Information Technology Act has also proposed a legal framework for the authentication and origin of electronic records.
Question 3.
Define Ethics and Morals.
Answer:
- Ethics is also called moral philosophy is the discipline concerned with what is morally good and bad, right or wrong.
- Morals are the standards of behaviour; principles of right and wrong behaviour.
- Thus Morals are dictated by society, culture, or religion.
Question 4.
What is Cyber Crime?
Answer:
- Computer Crime is alternatively referred to as Cybercrime.
- Computer crime is an act performed by a knowledgeable computer user, sometimes referred to as a Hacker.
- A Hacker who illegally browses or steals a company’s or individual’s private information.
- Cybercrimes can involve criminal activities that are traditional in nature, such as theft, fraud, forgery, defamation, and mischief.
Question 5.
State the examples of Cyber Crime.
Answer:
- Software piracy is nothing but copyright violation of software created originally by an individual or an institution.
- Software piracy includes stealing codes/programs and other information illegally and creating the imitated copy by unauthorized means.
- Gaining access without the users’ permission is known as unauthorized access.
- Authorization means granting access rights to resources.
- A copyright is a legal right that gives the creator of a literary, artistic, musical, or other creative work.
- Copyright owners have the right to control the reproduction of their work, including the right to receive the royalty payment for that reproduction.
- Activity such as decipher codes or passwords and breaking security systems for illegal reasons is called cracking.
- The cracker will use a program or script known as a Crack.
- Cyberstalking is a criminal practice where an individual uses the Internet to systematically harass or threaten someone.
- Phishing is a technique of extracting confidential information such as credit card numbers and username password combos by pretending as a legal enterprise.
- Phishing is typically carried out by email spoofing.
- Plagiarism is presenting someone else’s work or idea as your own without their consent.
- Hacking refers to unauthorized intrusion into a computer or a network.
- Hacker is a person intensely interested in the deep and hidden or concealed working of any computer operating system and programming language.
Question 6.
Explain Security Procedures.
Answer:
- Encryption is a method of converting the original message into random text.
- The full form of SSL is Secure Socket Layer.
- Through the Secure Socket Layer, the transmission of data is encrypted.
- A firewall refers to a network security (Hardware and Software) system which blocks certain types of information.
Question 7.
Discuss the IT Act of India 2000 and its features.
Answer:
- Information Technology Act, 2000 is an Act to provide legal recognition for transactions carried out by means of electronic data interchange and other means of electronic communication.
- Information Technology Act, 2000 aims to provide the legal infrastructure for E-Commerce in India.
- Cyber Laws have a major impact on e-businesses and the new economy in India.
- The Information Technology Act, 2000 also aims to provide for the legal framework.
- Digital signature has been replaced with electronic signature to make it a more technology-neutral act.