Cyber Law Model Question Paper Textit and cyber law question paper for psc 2 1.in order to link desktop applications to world wide web microsoft developed which technology? 2.in order to remove software bug defect _ is provided by software provider? 5. Floppy disc was invented by_?
Use of mobile phones, pagers and any form of internet based communication questions in this part carry 5 marks each 1. Neha, a desktop publishing professional has made several authentic looking certificates of major indian and foreign universities and has sold these counterfeit certificates for large sums of money to at least 3 people in india. Neha had sent these certificates as email attachments to prospective customers. Neha would be punished for forgery for forging a document under the information technology act, 20 b. Help her to understand the process by choosing the most appropriate statement. a a digital signature is formed subsequent to a message digest. B a digital signature is formed by signing a message digest with a c a digital signature is formed by making a message interact with a one way hash function and signing it with a private key, the public key of which has been certified by a certifying authority. Select the most appropriate statement about a recognized foreign certifying authority ca in india a a recognized foreign ca is recognized in india as a ca. C a foreign ca is a ca previously approved by the central government before being recognized by the controller and is required to be notified e a recognized foreign ca is a ca recognized by the controller of certifying authorities and previously approved by the central 5. Digicert obtained its license from the controller of certifying authorities in 2001. The management of digicert wants to quit the business and wind up the company. Select the most appropriate statement from the following: a digicert can quit the business and wind up the company. Melting Pot EssayB digicert has to notify the controller before terminating operations as a c digicert should notify the controller 90 days before terminating operations as a certifying authority. D the certifying authority has to notify the controller, advertise and give adequate compensation where required before ceasing to act as a c both copyrighted and patented in india d both copyrighted and patented in the united states of america 7. Icann’s udrp requires a domain registrant to submit to mandatory administrative proceedings in case a the registrant’s domain name is identical to a trademark in which a c the registrant has a deceptively similar trademark, has no rights to the domain and is using the domain in bad faith. Infecting someone’s computer with a computer virus can make a person liable to pay damages by way of compensation up to: 9. Rakesh has been accused by megaprogram corporation of reproducing and distributing their software programs illegally. Rakesh is liable under: a section 63b of the indian copyright act 1957 b section 63 of the indian copyright act 1957 c section 66 of the information technology act 20 d section 66 of the information technology act 20 and section 63 of a young lady named ritika adjania found her profile in an online community named 1worldcom on its website 1worldcom.net. Lahoti, rakesh remembered that he had to email a pooja has been assigned a project on intellectual property rights associated with semi – conductor technology. She downloads the articles and uses them extensively in her project without taking permission from the authors of the articles. Pooja insists that since she is using the articles for private use, she is not liable for any the computer as a target: using a computer to attack other computers. Cyber terrorism, ipr violations, credit card frauds, eft frauds, pornography etc. Technological advancements have created new possibilities for criminal activity, in particular the criminal misuse of information technologies such as a. Unauthorized access amp hacking: access means gaining entry into, instructing or communicating with the logical, arithmetical, or memory function resources of a computer, computer system or computer network. Unauthorized access would therefore mean any kind of access without the permission of either the rightful owner or the person in charge of a computer, computer system or computer network. They possess the desire to destruct and they get the kick out of such destruction. Some hackers hack for personal monetary gains, such as to stealing the credit card information, transferring money from various bank accounts to their own account followed by withdrawal of money. By hacking web server taking control on another persons website called as web hijacking the program that act like something useful but do the things that are quiet damping. When the victim unknowingly runs the server on its machine, the attacker will then use the client to connect to the server and start using the trojan. Tcp/ip protocol is the usual protocol type used for communications, but some functions of the trojans use the udp protocol as well. A program that has capability to infect other programs and make copies of itself and spread into other programs is called virus. Programs that multiply like viruses but spread from computer to computer are called as worms. E mail amp irc related crimes: email spoofing refers to email that appears to have been originated from one source when it was actually sent from another source. Please read email spamming refers to sending email to thousands and thousands of users similar to a chain letter. 3 sending malicious codes through email e mails are used to send viruses, trojans etc through emails as an attachment or by sending a link of website which on visiting downloads malicious code. E mail bombing is characterized by abusers repeatedly sending an identical email message to a particular address. Three main ways to attack irc are: verbalгў 10659 8218 ? 358 8220 attacks, clone attacks, and flood attacks. Denial of service attacks: flooding a computer resource with more requests than it can handle. This causes the resource to crash thereby denying access of service to authorized users. Attempts to flood a network, thereby preventing legitimate network traffic attempts to disrupt connections between two machines, thereby preventing access to a service written by lawjournal december 19, 2012 0 do you want to earn money? please contribute your law notes, law question papers, law case briefs, law news analysis, or other useful material for fellow students and get paid. Describe consumer in the internet era what are the strategies for differentiation? explain present state of copyright law inindia. click here for au b.b.a question paper all year how could software patent law impact electronic commerce? on july 23 rd. Court of appeals for the federal circuit ruled in the state street bank amp trust co. 1 soon thereafter, many internet firms claimed that their patents cover many current and emerging electronic commerce processes. In its framework for global electronic commerce, the united states government has already proclaimed that the private sector should lead. 2 however if the patentability of business processes embedded in internet technology is sustained, this could result in a chilling effect upon electronic commerce because patent holders could exert legal powers of restraint upon their competition by prohibiting the competition from using patented business methods, or by charging licensing fees. Music While Writing Papers
© Copyright 2013 - 2016 - www.writehomestudio.com.
All rights reserved. |