Maharashtra Board Class 11 Information Technology Important Questions Chapter 4 Cyber Law

Balbharati Maharashtra State Board Class 11 Information Technology Important Questions Chapter 4 Cyber Law Important Questions and Answers.

Maharashtra State Board 11th Information Technology Important Questions Chapter 4 Cyber Law

1. Fill in the Blanks.

Question 1.
__________ is the area of law that deals with the Internet’s relationship to technological and electronic elements.
Answer:
Cyberlaw

Question 2.
__________ is the part of the overall legal system that deals with the Internet, cyberspace, and their respective legal issues.
Answer:
Cyberlaw

Maharashtra Board Class 11 Information Technology Important Questions Chapter 4 Cyber Law

Question 3.
__________ covers a fairly broad area, encompassing several subtopics including freedom of expression, access to and usage of the Internet, and online privacy.
Answer:
Cyberlaw

Question 4.
The attempts to change outdated laws and provides ways to deal with cybercrimes.
Answer:
Information Technology Act 2000

Question 5.
The Act offers the much-needed legal framework so that information is not denied.
Answer:
Information Technology

Question 6.
The Act has also proposed a legal framework for the authentication and origin of an electronic records.
Answer:
Information Technology

Question 7.
__________ is also called moral philosophy is the discipline concerned with what is morally good and bad, right or wrong.
Answer:
Ethics

Maharashtra Board Class 11 Information Technology Important Questions Chapter 4 Cyber Law

Question 8.
__________ is the standards of behaviour; principles of right and wrong behaviour.
Answer:
Morals

Question 9.
Thus __________ are dictated by society, culture or religion.
Answer:
Morals

Question 10.
Computer Crime is alternatively referred to as __________
Answer:
Cybercrime

Question 11.
Computer crime is an act performed by a knowledgeable computer user, sometimes referred to as a __________
Answer:
Hacker

Question 12.
A __________ who illegally browses or steals a company’s or individual’s private information.
Answer:
Hacker

Question 13.
__________ can involve criminal activities that are traditional in nature, such as theft, fraud, forgery, defamation and mischief.
Answer:
Cybercrimes

Question 14.
__________ is nothing but copyright violation of software created originally by an individual or an institution.
Answer:
Software piracy

Maharashtra Board Class 11 Information Technology Important Questions Chapter 4 Cyber Law

Question 15.
__________ includes stealing of codes/programs and other information illegally and creating the imitated copy by unauthorized means.
Answer:
Software piracy

Question 16.
Gaining access without the users’ permission is known as __________
Answer:
Unauthorized Access

Question 17.
__________ means granting access rights to resources.
Answer:
Authorization

Question 18.
A __________ is a legal right that gives the creator of a literary, artistic, musical, or other creative work.
Answer:
Copyright

Question 19.
__________ owners have the right to control the reproduction of their work, including the right to receive the royalty payment for that reproduction.
Answer:
Copyright

Question 20.
Activity such as decipher codes or passwords and breaking security systems for illegal reasons is called __________
Answer:
Cracking

Question 21.
The cracker will use a program or script known as a __________
Answer:
Crack

Maharashtra Board Class 11 Information Technology Important Questions Chapter 4 Cyber Law

Question 22.
__________ is a criminal practice where an individual uses the Internet to systematically harass or threaten someone.
Answer:
Cyberstalking

Question 23.
__________ is a technique of extracting confidential information such as credit card numbers and username password combos by pretending as a legal enterprise.
Answer:
Phishing

Question 24.
__________ is typically carried out by email spoofing.
Answer:
Phishing

Question 25.
__________ is presenting someone else’s work or idea as your own without their consent.
Answer:
Plagarism

Question 26.
__________ refers to unauthorised intrusion into a computer or a network.
Answer:
Hacking

Question 27.
__________ is a person intensely interested in the deep and hidden or concealed working of any computer operating system and programming language.
Answer:
Hacker

Maharashtra Board Class 11 Information Technology Important Questions Chapter 4 Cyber Law

Question 28.
__________ is a method of converting the original message into random text.
Answer:
Encryption

Question 29.
Full form of SSL is __________
Answer:
Secure Socket Layer

Question 30.
Through the __________, transmission of data is encrypted.
Answer:
Secure Socket Layer

Question 31.
__________ refers to a network security (Hardware and Software) system which blocks certain types of information.
Answer:
Firewall

Question 32.
__________ is an Act to provide legal recognition for transactions carried out by means of electronic data interchange and other means of electronic communication.
Answer:
Information Technology Act, 2000

Question 33.
__________ aims to provide the legal infrastructure for E-Commerce in India.
Answer:
Information Technology Act, 2000

Question 34.
The __________ have a major impact on E-Businesses and the new economy in India.
Answer:
Cyber laws

Maharashtra Board Class 11 Information Technology Important Questions Chapter 4 Cyber Law

Question 35.
The __________ also aims to provide for the legal framework.
Answer:
Information Technology Act, 2000

Question 36.
__________ has been replaced with the electronic signature to make it a more technology-neutral act.
Answer:
Digital Signature

2. True or False.

Question 1.
Criminal Law is the area of law that deals with the Internet’s relationship to technological and electronic elements.
Answer:
False

Question 2.
Cyberlaw is the part of the overall legal system that deals with the Internet, cyberspace, and their respective legal issues.
Answer:
True

Question 3.
Cyberlaw covers a fairly broad area, encompassing several subtopics including freedom of expression, access to and usage of the Internet, and online privacy.
Answer:
True

Maharashtra Board Class 11 Information Technology Important Questions Chapter 4 Cyber Law

Question 4.
The Information Technology Act 2000 attempts to change outdated laws and provides ways to deal with cybercrimes.
Answer:
True

Question 5.
The Information Technology Act offers the much-needed legal framework so that information is not denied.
Answer:
True

Question 6.
The Computer Act has also proposed a legal framework for the authentication and origin of an electronic records.
Answer:
False

Question 7.
Morals are also called moral philosophy is the discipline concerned with what is morally good and bad, right or wrong.
Answer:
False

Question 8.
Ethics is the standards of behaviour; principles of right and wrong behaviour.
Answer:
False

Question 9.
Thus Morals are dictated by society, culture, or religion.
Answer:
True

Question 10.
Computer Crime is alternatively referred to as Hacker.
Answer:
False

Maharashtra Board Class 11 Information Technology Important Questions Chapter 4 Cyber Law

Question 11.
Computer crime is an act performed by a knowledgeable computer user, sometimes referred to as a Hacker.
Answer:
True

Question 12.
A Cybercrime who illegally browses or steals a company’s or individual’s private information.
Answer:
False

Question 13.
Cybercrimes can involve criminal activities that are traditional in nature, such as theft, fraud, forgery, defamation, and mischief.
Answer:
True

Question 14.
Software piracy is nothing but copyright violation of software created originally by an individual or an institution.
Answer:
True

Question 15.
Unauthorized access includes stealing of codes/programs and other information illegally and creating the imitated copy by unauthorized means.
Answer:
False

Question 16.
Gaining access without the user’s permission is known as Software piracy.
Answer:
False

Question 17.
Authorization means granting access rights to resources.
Answer:
True

Maharashtra Board Class 11 Information Technology Important Questions Chapter 4 Cyber Law

Question 18.
Cracking is a legal right that gives the creator of a literary, artistic, musical, or other creative work.
Answer:
False

Question 19.
Copyright owners have the right to control the reproduction of their work, including the right to receive the royalty payment for that reproduction.
Answer:
True

Question 20.
Activity such as decipher codes or passwords and breaking security systems for illegal reasons is called copyright.
Answer:
False

Question 21.
The cracker will use a program or script known as a Crack.
Answer:
True

Question 22.
Cyberstalking is a criminal practice where an individual uses the Internet to systematically harass or threaten someone.
Answer:
True

Question 23.
Phishing is a technique of extracting confidential information such as credit card numbers and username password combos by pretending as a legal enterprise.
Answer:
True

Maharashtra Board Class 11 Information Technology Important Questions Chapter 4 Cyber Law

Question 24.
Phishing is typically carried out by email spoofing.
Answer:
True

Question 25.
Plagiarism is presenting someone else’s work or idea as your own without their consent.
Answer:
True

Question 26.
Hacking refers to unauthorized intrusion into a computer or a network.
Answer:
True

Question 27.
Hacker is a person intensely interested in the deep and hidden or concealed working of any computer operating system and programming language.
Answer:
True

Question 28.
Encryption is a method of converting the original message into random text.
Answer:
True

Question 29.
The full form of SSL is Secure Socket Layer.
Answer:
True

Question 30.
Through the Encryption transmission of data is encrypted.
Answer:
False

Maharashtra Board Class 11 Information Technology Important Questions Chapter 4 Cyber Law

Question 31.
Encryption refers to a network security (Hardware and Software) system which blocks certain types of information.
Answer:
False

Question 32.
A digital signature is an Act to provide legal recognition for transactions carried out by means of electronic data interchange and other means of electronic communication.
Answer:
False

Question 33.
Information Technology Act, 2000 aims to provide the legal infrastructure for E-Commerce in India.
Answer:
True

Question 34.
Cyber laws have a major impact on E-Businesses and the new economy in India.
Answer:
True

Question 35.
The Information Technology Act, 2000 also aims to provide for the legal framework.
Answer:
True

Maharashtra Board Class 11 Information Technology Important Questions Chapter 4 Cyber Law

Question 36.
Cyber laws have been replaced with electronic signatures to make it a more technology-neutral act.
Answer:
False

3. Multiple Choice Question (Single Choice)

Question 1.
__________ is the area of law that deals with the Internet’s relationship to technological and electronic elements.
(A) Cyberlaw
(B) Criminal Law
(C) Business Law
(D) Internet Law
Answer:
(A) Cyberlaw

Question 2.
__________ is the part of the overall legal system that deals with the Internet, cyberspace, and their respective legal issues.
(A) Cyberlaw
(B) Criminal Law
(C) Business Law
(D) Internet Law
Answer:
(A) Cyberlaw

Question 3.
__________ covers a fairly broad area, encompassing several subtopics including freedom of expression, access to and usage of the Internet, and online privacy.
(A) Cyberlaw
(B) Criminal Law
(C) Business Law
(D) Internet Law
Answer:
(A) Cyberlaw

Maharashtra Board Class 11 Information Technology Important Questions Chapter 4 Cyber Law

Question 4.
The __________ attempts to change outdated laws and provides ways to deal with cybercrimes.
(A) Information Technology Act 2000
(B) Cyber Rule
(C) Computer Act
(D) Legal Act
Answer:
(A) Information Technology Act 2000

Question 5.
The __________ Act offers the much-needed legal framework so that information is not denied.
(A) Cyber Rule
(B) Information Technology
(C) Computer Act
(D) Legal Act
Answer:
(B) Information Technology

Question 6.
The __________ Act has also proposed a legal framework for the authentication and origin of an electronic records.
(A) Cyber Rule
(B) Information Technology
(C) Computer Act
(D) Legal Act
Answer:
(B) Information Technology

Maharashtra Board Class 11 Information Technology Important Questions Chapter 4 Cyber Law

Question 7.
__________ is also called moral philosophy is the discipline concerned with what is morally good and bad, right or wrong.
(A) Ethics
(B) Morals
(C) Society
(D) Culture
Answer:
(A) Ethics

Question 8.
__________ is the standards of behaviour; principles of right and wrong behaviour.
(A) Ethics
(B) Morals
(C) Society
(D) Culture
Answer:
(B) Morals

Question 9.
Thus __________ are dictated by society, culture or religion.
(A) Ethics
(B) Morals
(C) Society
(D) Culture
Answer:
(B) Morals

Maharashtra Board Class 11 Information Technology Important Questions Chapter 4 Cyber Law

Question 10.
Computer Crime is alternatively referred to as __________
(A) Cybercrime
(B) Hacker
(C) Computer crime
(D) Illegal Act
Answer:
(A) Cybercrime

Question 11.
Computer crime is an act performed by a knowledgeable computer user, sometimes referred to as a __________
(A) Cybercrime
(B) Hacker
(C) Computer crime
(D) Illegal Act
Answer:
(B) Hacker

Question 12.
A __________ who illegally browses or steals a company’s or individual’s private information.
(A) Cybercrime
(B) Hacker
(C) Computer crime
(D) Illegal Act
Answer:
(B) Hacker

Question 13.
__________ can involve criminal activities that are traditional in nature, such as theft, fraud, forgery, defamation, and mischief.
(A) Cybercrimes
(B) Hacker
(C) Computer crime
(D) Illegal Act
Answer:
(A) Cybercrimes

Maharashtra Board Class 11 Information Technology Important Questions Chapter 4 Cyber Law

Question 14.
__________ is nothing but copyright violation of software created originally by an individual or an institution.
(A) Software piracy
(B) Unauthorized access
(C) Authorization
(D) Copyright
Answer:
(A) Software piracy

Question 15.
__________ includes stealing of codes/programs and other information illegally and creating the imitated copy by unauthorized means.
(A) Software piracy
(B) Unauthorized access
(C) Authorization
(D) Copyright
Answer:
(A) Software piracy

Question 16.
Gaining access without the users’ permission is known as __________
(A) Software piracy
(B) Unauthorized access
(C) Authorization
(D) Copyright
Answer:
(B) Unauthorized access

Question 17.
__________ means granting access rights to resources.
(A) Software piracy
(B) Unauthorized access
(C) Authorization
(D) Copyright
Answer:
(C) Authorization

Question 18.
A __________ is a legal right that gives the creator of a literary, artistic, musical, or other creative work.
(A) Software piracy
(B) Unauthorized access
(C) Authorization
(D) Copyright
Answer:
(D) Copyright

Maharashtra Board Class 11 Information Technology Important Questions Chapter 4 Cyber Law

Question 19.
__________ owners have the right to control the reproduction of their work, including the right to receive the royalty payment for that reproduction.
(A) Software piracy
(B) Unauthorized access
(C) Authorization
(D) Copyright
Answer:
(D) Copyright

Question 20.
Activity such as decipher codes or passwords and breaking security systems for illegal reasons is called __________
(A) Cracking
(B) Crack
(C) Cyberstalking
(D) Phishing
Answer:
(A) Cracking

Question 21.
The cracker will use a program or script known as a __________
(A) Cracking
(B) Crack
(C) Cyberstalking
(D) Phishing
Answer:
(B) Crack

Question 22.
__________ is a criminal practice where an individual uses the Internet to systematically harass or threaten someone.
(A) Cracking
(B) Crack
(C) Cyberstalking
(D) Phishing
Answer:
(C) Cyberstalking

Maharashtra Board Class 11 Information Technology Important Questions Chapter 4 Cyber Law

Question 23.
__________ is a technique of extracting confidential information such as credit card numbers and username password combos by pretending as a legal enterprise.
(A) Cracking
(B) Crack
(C) Cyberstalking
(D) Phishing
Answer:
(D) Phishing

Question 24.
__________ is typically carried out by email spoofing.
(A) Cracking
(B) Crack
(C) Cyberstalking
(D) Phishing
Answer:
(D) Phishing

Question 25.
__________ is presenting someone else’s work or idea as your own without their consent.
(A) Plagiarism
(B) Hacking
(C) Hacker
(D) A. Cracking
Answer:
(A) Plagarism

Question 26.
__________ refers to unauthorised intrusion into a computer or a network.
(A) Plagiarism
(B) Hacking
(C) Hacker
(D) Cracking
Answer:
(B) Hacking

Question 27.
__________ is a person intensely interested in the deep and hidden or concealed working of any computer operating system and programming language.
(A) Plagiarism
(B) Hacking
(C) Hacker
(D) Cracking
Answer:
(C) Hacker

Maharashtra Board Class 11 Information Technology Important Questions Chapter 4 Cyber Law

Question 28.
__________ is a method of converting the original message into random text.
(A) Encryption
(B) Secure Socket Layer
(C) Firewall
(D) Hardware
Answer:
(A) Encryption

Question 29.
Full form of SSL is __________
(A) Secure Socket Layer
(B) Secure Switch Layer
(C) Secure Session Lesson
(D) System Secure Layer
Answer:
(A) Secure Socket Layer

Question 30.
Through the __________, transmission of data is encrypted.
(A) Secure Socket Layer
(B) Secure Switch Layer
(C) Secure Session Lesson
(D) System Secure Layer
Answer:
(A) Secure Socket Layer

Question 31.
__________ refers to a network security (Hardware and Software) system which blocks certain types of information.
(A) Encryption
(B) Secure Socket Layer
(C) Firewall
(D) Hardware
Answer:
(C) Firewall

Question 32.
__________ is an Act to provide legal recognition for transactions carried out by means of electronic data interchange and other means of electronic communication.
(A) Information Technology Act, 2000
(B) Cyber laws
(C) Digital Signature
(D) Digital Certificate
Answer:
(A) Information Technology Act, 2000

Maharashtra Board Class 11 Information Technology Important Questions Chapter 4 Cyber Law

Question 33.
__________ aims to provide the legal infrastructure for e-commerce in India.
(A) Information Technology Act, 2000
(B) Cyber laws
(C) Digital signature
(D) Digital Certificate
Answer:
(A) Information Technology Act, 2000

Question 34.
The __________ have a major impact on E-Businesses and the new economy in India.
(A) Information Technology Act, 2000
(B) Cyber Laws
(C) Digital signature
(D) Digital Certificate
Answer:
(B) Cyber Laws

Question 35.
The also aims to provide for the legal framework.
(A) Information Technology Act, 2000
(B) Cyber Laws
(C) Digital signature
(D) Digital Certificate
Answer:
(A) Information Technology Act, 2000

Question 36.
__________ has been replaced with the electronic signature to make it a more technology-neutral act.
(A) Information Technology Act, 2000
(B) Cyber laws
(C) Digital Signature
(D) Digital Certificate
Answer:
(C) Digital Signature

4. Multiple Choice Two Correct Answers.

Question 1.
The Information Technology Act 2000 attempts to change outdated __________ and provides ways to deal with __________
(A) Authentication
(B) Laws
(C) Electronic record
(D) Cybercrimes
(E) Morals
Answer:
(B) Laws, (D) Cybercrimes

Maharashtra Board Class 11 Information Technology Important Questions Chapter 4 Cyber Law

Question 2.
The Information Technology Act has also proposed a legal framework for the __________ and origin of __________
(A) Authentication
(B) Laws
(C) Electronic record
(D) Cybercrimes
(E) Morals
Answer:
(A) Authentication, (C) Electronic record

Question 3.
Thus __________ are dictated by society, culture or religion while __________ are chosen by the person himself which governs his life.
(A) Authentication
(B) Laws
(C) Electronic record
(D) Morals
(E) Ethics
Answer:
(D) Morals, (E) Ethics

Question 4.
Hacker is a person intensely interested in the deep and hidden or concealed working of any computer __________ and __________
(A) Operating System
(B) Programming Language
(C) Individual
(D) Institution
(E) Passwords
Answer:
(A) Operating System, (B) Programming Language

Question 5.
Software piracy is nothing but copyright violation of software created originally by an __________ or an __________
(A) Operating system
(B) Programming language
(C) Individual
(D) Institution
(E) Passwords
Answer:
(C) Individual, (D) Institution

Maharashtra Board Class 11 Information Technology Important Questions Chapter 4 Cyber Law

Question 6.
Activity such as __________ or __________ and breaking security systems for illegal reasons is called cracking.
(A) Operating system
(B) Programming language
(C) Individual
(D) Decipher Codes
(E) Passwords
Answer:
(D) Decipher Codes, (E) Passwords

Question 7.
Phishing is a technique of extracting confidential information such as __________ and __________ combos by pretending as a legal enterprise.
(A) Computer
(B) Credit Card Numbers
(C) Network
(D) Username Password
(E) Programming Language
Answer:
(B) Credit Card Numbers, (D) Username Password

Question 8.
Hacking refers to unauthorised intrusion into a __________ or a __________
(A) Computer
(B) Credit Card Numbers
(C) Network
(D) Username Password
(E) Programming Language
Answer:
(A) Computer, (C) Network

Question 9.
Hacker is a person intensely interested in the deep and hidden or concealed working of any computer __________ and __________
(A) Operating system
(B) Programming language
(C) Individual
(D) Decipher Codes
(E) Passwords
Answer:
(A) Operating system, (B) Programming language

Question 10.
Encryption is a method of converting the __________ message into __________ text.
(A) Original
(B) Random
(C) Hardware
(D) Software
(E) Electronic communication
Answer:
(A) Original, (B) Random

Question 11.
Firewall refers to network security __________ and __________ system which blocks certain type of information.
(A) Original
(B) Random
(C) Hardware
(D) Software
(E) Electronic communication
Answer:
(C) Hardware, (D) Software

Maharashtra Board Class 11 Information Technology Important Questions Chapter 4 Cyber Law

Question 12.
Information Technology Act, 2000 is an Act to provide legal recognition for transaction carried out by means of __________ and other means of __________
(A) Original
(B) Random
(C) Hardware
(D) Electronic Data Interchange
(E) Electronic Communication
Answer:
(D) Electronic Data Interchange, (E) Electronic Communication

Question 13.
Information Technology Act, 2000 aims to provide the __________ infrastructure for __________ in India.
(A) Legal
(B) E-Commerce
(C) Original
(D) Random
(E) Hardware
Answer:
(A) Legal, (B) E-Commerce

5. Multiple Choice Three Correct Answers.

Question 1.
Cyberlaw is the area of law that deals with the Internet’s relationship to technological and electronic elements, including computers, __________, __________ and __________
(A) Software
(B) Internet
(C) Hardware
(D) Legal Issues
(E) Information Systems
Answer:
(A) Software, (C) Hardware, (E) Information Systems

Question 2.
Cyberlaw is the part of the overall legal system that deals with the __________, __________, and their respective __________
(A) Software
(B) Internet
(C) Cyberspace
(D) Legal Issues
(E) Information Systems
Answer:
(B) Internet, (C) Cyberspace, (D) Legal Issues

Question 3.
Cyber lawcoversafairlybroadarea,encompassingseveralsubtopicsincluding __________, access to and __________, and __________
(A) Freedom of expression
(B) Usage of the Internet
(C) Online privacy
(D) Electronic Crime
(E) Hi-Tech Crime
Answer:
(A) Freedom of expression, (B) Usage of the Internet, (C) Online privacy

Maharashtra Board Class 11 Information Technology Important Questions Chapter 4 Cyber Law

Question 4.
Computer Crime is alternatively referred to as __________, __________ or __________
(A) Freedom of expression
(B) Usage of the Internet
(C) Cybercrime
(D) Electronic Crime
(E) Hi-Tech Crime
Answer:
(C) Cybercrime, (D) Electronic Crime, (E) Hi-Tech Crime

Question 5.
Activity such as __________ codes or __________ and breaking __________ systems for illegal reasons is called cracking.
(A) Cyber Cafe
(B) Decipher
(C) Cyber Security
(D) Passwords
(E) Security
Answer:
(B) Decipher, (D) Passwords, (E) Security

Question 6.
The IT Act 2000 was amended in 2008 and 2011 and it includes rules for __________, __________, __________ by service provider, Audit of electronic document etc.
(A) Cyber Cafe
(B) Decipher
(C) Cyber Security
(D) Delivery of Services
(E) Security
Answer:
(A) Cyber Cafe, (C) Cyber Security, (D) Delivery of Services

6. Match the following.

Question 1.

Column ‘A’ Column ‘B’
(1) Ethics (A) Computer Crime
(2) Morals (B) Principles of right and wrong
(3) Cyber Crime (C) Moral philosophy
(4) Hacker (D) Illegally browses or steals a company’s or individual’s private information

Answer:

Column ‘A’ Column ‘B’
(1) Ethics (C) Moral philosophy
(2) Morals (B) Principles of right and wrong
(3) Cyber Crime (A) Computer Crime
(4) Hacker (D) Illegally browses or steals a company’s or individual’s private information

Question 2.

Column ‘A’ Column ‘B’
(1) Software Piracy (A) Legal right
(2) Unauthorized access (B) Gaining access without the users’ permission
(3) Authorization (C) Granting access rights to resources
(4) Copyright (D) Copyright violation of software

Answer:

Column ‘A’ Column ‘B’
(1) Software Piracy (D) Copyright violation of software
(2) Unauthorized access (B) Gaining access without the users’ permission
(3) Authorization (C) Granting access rights to resources
(4) Copyright (A) Legal right

Question 3.

Column ‘A’ Column ‘B’
(1) Copyright owners (A) Have the right to control the reproduction of their work
(2) Cracking (B) Will use a program or script known as a crack
(3) Cracker (C) Breaking security systems for illegal reasons
(4) Cyberstalking (D) Uses the Internet to systematically harass or threaten someone

Answer:

Column ‘A’ Column ‘B’
(1) Copyright owners (A) Have the right to control the reproduction of their work
(2) Cracking (C) Breaking security systems for illegal reasons
(3) Cracker (B) Will use a program or script known as a crack
(4) Cyberstalking (D) Uses the Internet to systematically harass or threaten someone

Maharashtra Board Class 11 Information Technology Important Questions Chapter 4 Cyber Law

Question 4.

Column ‘A’ Column ‘B’
(1) Phishing (A) Technique of extracting confidential information
(2) Plagiarism (B) Presenting someone else’s work or idea as your own without their consent
(3) Hacking (C) Safe and responsible use of information and communication technology
(4) Cyber Safety (D) Refers to unauthorized intrusion into a computer or a network

Answer:

Column ‘A’ Column ‘B’
(1) Phishing (A) Technique of extracting confidential information
(2) Plagiarism (B) Presenting someone else’s work or idea as your own without their consent
(3) Hacking (D) Refers to unauthorized intrusion into a computer or a network
(4) Cyber Safety (C) Safe and responsible use of information and communication technology

Question 5.

Column ‘A’ Column ‘B’
(1) Netiquette (A) Network Security
(2) Encryption (B) Method of converting the original message into random text
(3) Secure Socket Layer (C) Transmission of data is encrypted
(4) Firewall (D) Internet etiquette

Answer:

Column ‘A’ Column ‘B’
(1) Netiquette (D) Internet etiquette
(2) Encryption (B) Method of converting the original message into random text
(3) Secure Socket Layer (C) Transmission of data is encrypted
(4) Firewall (A) Network Security

Question 6.

Column ‘A’ Column ‘B’
(1) IT Act 2000 (A) Provide legal recognition for transactions carried out by means of electronic data interchange
(2) Digital Signature (B) Electronic Signature

Answer:

Column ‘A’ Column ‘B’
(1) IT Act 2000 (A) Provide legal recognition for transactions carried out by means of electronic data interchange
(2) Digital Signature (B) Electronic Signature

7. Answer Briefly.

Question 1.
What is Cyber Law?
Answer:

  1. Cyberlaw is the area of law that deals with the Internet’s relationship to technological and electronic elements.
  2. Cyberlaw is the part of the overall legal system that deals with the Internet, cyberspace, and their respective legal issues.
  3. Cyberlaw covers a fairly broad area, encompassing several subtopics including freedom of expression, access to and usage of the Internet, and online privacy

Question 2.
State the advantages of Cyber Law.
Answer:

  1. The Information Technology Act 2000 attempts to change outdated laws and provides ways to deal with cybercrimes.
  2. The Information Technology Act offers the much-needed legal framework so that information is not denied.
  3. The Information Technology Act has also proposed a legal framework for the authentication and origin of electronic records.

Question 3.
Define Ethics and Morals.
Answer:

  1. Ethics is also called moral philosophy is the discipline concerned with what is morally good and bad, right or wrong.
  2. Morals are the standards of behaviour; principles of right and wrong behaviour.
  3. Thus Morals are dictated by society, culture, or religion.

Maharashtra Board Class 11 Information Technology Important Questions Chapter 4 Cyber Law

Question 4.
What is Cyber Crime?
Answer:

  1. Computer Crime is alternatively referred to as Cybercrime.
  2. Computer crime is an act performed by a knowledgeable computer user, sometimes referred to as a Hacker.
  3. A Hacker who illegally browses or steals a company’s or individual’s private information.
  4. Cybercrimes can involve criminal activities that are traditional in nature, such as theft, fraud, forgery, defamation, and mischief.

Question 5.
State the examples of Cyber Crime.
Answer:

  1. Software piracy is nothing but copyright violation of software created originally by an individual or an institution.
  2. Software piracy includes stealing codes/programs and other information illegally and creating the imitated copy by unauthorized means.
  3. Gaining access without the users’ permission is known as unauthorized access.
  4. Authorization means granting access rights to resources.
  5. A copyright is a legal right that gives the creator of a literary, artistic, musical, or other creative work.
  6. Copyright owners have the right to control the reproduction of their work, including the right to receive the royalty payment for that reproduction.
  7. Activity such as decipher codes or passwords and breaking security systems for illegal reasons is called cracking.
  8. The cracker will use a program or script known as a Crack.
  9. Cyberstalking is a criminal practice where an individual uses the Internet to systematically harass or threaten someone.
  10. Phishing is a technique of extracting confidential information such as credit card numbers and username password combos by pretending as a legal enterprise.
  11. Phishing is typically carried out by email spoofing.
  12. Plagiarism is presenting someone else’s work or idea as your own without their consent.
  13. Hacking refers to unauthorized intrusion into a computer or a network.
  14. Hacker is a person intensely interested in the deep and hidden or concealed working of any computer operating system and programming language.

Question 6.
Explain Security Procedures.
Answer:

  1. Encryption is a method of converting the original message into random text.
  2. The full form of SSL is Secure Socket Layer.
  3. Through the Secure Socket Layer, the transmission of data is encrypted.
  4. A firewall refers to a network security (Hardware and Software) system which blocks certain types of information.

Maharashtra Board Class 11 Information Technology Important Questions Chapter 4 Cyber Law

Question 7.
Discuss the IT Act of India 2000 and its features.
Answer:

  1. Information Technology Act, 2000 is an Act to provide legal recognition for transactions carried out by means of electronic data interchange and other means of electronic communication.
  2. Information Technology Act, 2000 aims to provide the legal infrastructure for E-Commerce in India.
  3. Cyber Laws have a major impact on e-businesses and the new economy in India.
  4. The Information Technology Act, 2000 also aims to provide for the legal framework.
  5. Digital signature has been replaced with electronic signature to make it a more technology-neutral act.