SlideShare a Scribd company logo
1 of 6
WE PROVIDE CASE STUDY ANSWERS, ASSIGNMENT
SOLUTIONS, PROJECT REPORTS AND THESIS
aravind.banakar@gmail.com
ARAVIND - 09901366442 – 09902787224
CYBER LAW
1. Neha, a desktop publishing professional has made several authentic looking
certificates
Of major indian and foreign universities and has sold these counterfeit for large sums of
money to at least 3 people in india. Neha had sent these certificates as email
attachments to prospective customers. Select the most appropriate answer keeping the
said facts in mind:
a. neha would be punished for forgery for forging a document under the information
technology act,2000
b. neha would be punished for forgery for forging a document under the indian the
penal code,1860
c. neha would be punished for forgery for forging an electronic record under the indian
penal code,1860
d. neha would be punished for forgery for forging an electronic record under the
information Act,2000
2.With regard to jurisprudence relating to pornography, tick the most appropriate
answer:
a. most jurisdictions punish dissemination of pornography, in some manner
b. all jurisdictions punish dissemination of Publishing of child pornography,
c. in some jurisdictions dissemination and possession of actual child pornography as
well as dissemination of simulated computer animated images depicting child
pornography is penalized.
d. some jurisdictions punish dissemination as well as possession of child pornography
3. Rita is not sure how exactly a digital signature system works. Help her to understand
the process by chossing the most appropriate statement.
a. A digital signature is formed subsequent to a message digest.
b. A digital signature is formed by signing a message digest with a private key
c. A digital signature is formed by making a message interact with a one way hash been
certified by a certifying authority.
d. A digital signature is verified by ausing hash function and public key
4.Select the most appropriate statement about a recognized foreign certifying authirty
(CA) in india
a. A recognized foreign CA is recognized in india as a CA.
b. A recognized foreign CA is CA for purpose of the IT Act.
c. A foreign CA is a CA previously approved by the central government before being
recognized by the controller and is required to be notified in the official gazette.
e. A recognized foreign CA is a CA recognized by the controller of certifying authorities
and previously approved by the central government.
5. Digicert Ltd. Is a licensed certifying authority in india. Digicert obtained its license
from the controller of certifying authority in 2001. However, business has not picked up
and the company has gone into losses. The management of digicert wants to quit the
business and wind up the company. Select the most appropriate statement from the
following:
a. Digicert can quit the business and wind up the company.
b. Digicert has to notify the controller before terminating operations as a certifying
authority.
c. Digicert should notify the controller, advertise and give adequate compensation where
required before ceasing to act as a certifying authority
d. the certifying authority has to notify the controller, advertise and give adequate
compensation where required before ceasing to as a certifying authority .
6. computer software can be
a. copyrighted in india
b. patened in india
c. both copyrighted and patented in india
d. both copyrighted abd patented in the united states of americs
7. ICANN’s UDRP requires a domain registrant to submit to mandatory administrative
proceedings in case
a. the registrant’s domain name is identical to a trademark in which a complaint has
rights
b. the registrant has no rights to the domain and has registered the domain in bad faith.
c. the registrant has a deceptively similar trademark, has no rights to the domain and
using the domain in bad faith.
d. the registrant has registsred the domain name for disrupting the business of the
competitor.
8. infecting someone’s computer virus can make a person liable to pay damages by way
compensation up to
a. A crore of rupees
b. Two crore rupees
c. three crore rupees
d. four crore rupees
9. Rakesh has been accused by megaprogram corporation of reproducing and
distributing their software
Programs illegally. Rakesh is liable under:
a. Section 63B of the indian copyright act 1957
b. Section 63 of the Indian Copyright Act 1957
c. Section 66 of the Information Technology Act 2000
d. Section 66 of the Information Technology Act 2000 and Section 63 of copyright Act
1957
10. Hacking under the Information Technology Act 2000 Means
a. Unauthorized access to another person’s computer system
b. Deleting information stored in another person’s computer System.
c. Knowingly or intentionally deleting information stored in another person’s computer
system
d. knowingly or intentionally deleting valuable information stored in another person’s
computer system.
01.
A young lady named ritika adjania found her profile in an online community named
“1worldcom” on its website. Net. Her surprise turned to horror when she realized that
the profile pained her as a person of dubious character whose only interest was money.
The profile also “boasted” of her achievements which included defrauding a bank of
rs.10 lakh and getting away with it. Ritika immediately informed “1worldcom” of the
posting and requested them to remove it. The posting was removed the next day but
reappeared a week later. It was again removed but reappeared two days later. Deeply
hurt, Ritika filed a suit for defamation against “1worldcom”. With reference to
jurisprudence of defamation cases, examine the liability of “1worldcom”. ( Marks – 10 )
02
Rakesh had an appointment with Dr.Mina lahoti at the wockhardt hospital, Mumbai.
While waiting for Dr.lahoti, Rakesh remembered that he had to email a document (that
he was carrying in a floppy)to his office. As he looked around, he realized that there was
a computer at the reception desk, which was switched on. However, the receptionist was
nowhere to be seen. Rakesh immediately inserted the fooppy disk containing the
document into the floppy drive of the computer at the reception desk. Just then, the
receptionist entered and saw rakesh at the computer she immediately called the security
guards and intimated the manager about the incident. The manager wants to take legal
action against rakesh unauthorized access. Advise the manager.(Marks – 15)
03
Pooja has been assigned a project on “intellectual property rights associated with sami-
condoctor technology”. She conducts a search on google and comes across many articles
on the topic, she downloads the articles and uses them extensively in her project without
taking permission from the authors of the articles. Pooja insists that since is using the
articles for private use, she is not liable for any infringement. Is she right? Discuss
(Mark- 15 )
04
Section 29of the information technology act2000 confers power upon the controller of
certifying authorities to investigate contraventions under the act. Section 78 confers
power uupon a police or above to investigate any offence under the act. Rashmi suspects
rakesh of creating and publishing digital signature certificates for fraudulent purpose,
but she is confused about whom to approach for investigating the suspected crime. Clear
rashmi confusion with detailed explanations (Marks – 15 )
WE PROVIDE CASE STUDY ANSWERS, ASSIGNMENT
SOLUTIONS, PROJECT REPORTS AND THESIS
aravind.banakar@gmail.com
ARAVIND - 09901366442 – 09902787224
03
Pooja has been assigned a project on “intellectual property rights associated with sami-
condoctor technology”. She conducts a search on google and comes across many articles
on the topic, she downloads the articles and uses them extensively in her project without
taking permission from the authors of the articles. Pooja insists that since is using the
articles for private use, she is not liable for any infringement. Is she right? Discuss
(Mark- 15 )
04
Section 29of the information technology act2000 confers power upon the controller of
certifying authorities to investigate contraventions under the act. Section 78 confers
power uupon a police or above to investigate any offence under the act. Rashmi suspects
rakesh of creating and publishing digital signature certificates for fraudulent purpose,
but she is confused about whom to approach for investigating the suspected crime. Clear
rashmi confusion with detailed explanations (Marks – 15 )
WE PROVIDE CASE STUDY ANSWERS, ASSIGNMENT
SOLUTIONS, PROJECT REPORTS AND THESIS
aravind.banakar@gmail.com
ARAVIND - 09901366442 – 09902787224

More Related Content

What's hot

penalties offences with case studies
penalties offences with case studiespenalties offences with case studies
penalties offences with case studiesKirtesh Dudawat
 
Cyber law - Security aspects and Intellectual Property rights
Cyber law - Security aspects and Intellectual Property rights Cyber law - Security aspects and Intellectual Property rights
Cyber law - Security aspects and Intellectual Property rights premarhea
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & ForensicsHarshita Ved
 
Electronic evidence digital evidence in india
Electronic evidence  digital evidence in indiaElectronic evidence  digital evidence in india
Electronic evidence digital evidence in indiaAdv Prashant Mali
 
Electronic Evidence fraud conference
Electronic Evidence   fraud conferenceElectronic Evidence   fraud conference
Electronic Evidence fraud conferenceAdv Prashant Mali
 
India cyber
India cyberIndia cyber
India cybersabariss
 
Www.cccindia.co corecentre database_docs_doc_files_india_cyber
Www.cccindia.co corecentre database_docs_doc_files_india_cyberWww.cccindia.co corecentre database_docs_doc_files_india_cyber
Www.cccindia.co corecentre database_docs_doc_files_india_cybercloneseeyom
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & ForensicsHarshita Ved
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & ForensicsHarshita Ved
 
Neeraj aarora cyber_lawyer_section 65b_evidence act
Neeraj aarora cyber_lawyer_section 65b_evidence actNeeraj aarora cyber_lawyer_section 65b_evidence act
Neeraj aarora cyber_lawyer_section 65b_evidence actNeeraj Aarora
 
Cyber laws - Ritu Gautam
Cyber laws - Ritu GautamCyber laws - Ritu Gautam
Cyber laws - Ritu GautamRitu Gautam
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & ForensicsHarshita Ved
 
Modern Method for Detecting Web Phishing Using Visual Cryp-tography (VC) and ...
Modern Method for Detecting Web Phishing Using Visual Cryp-tography (VC) and ...Modern Method for Detecting Web Phishing Using Visual Cryp-tography (VC) and ...
Modern Method for Detecting Web Phishing Using Visual Cryp-tography (VC) and ...IJERA Editor
 

What's hot (18)

penalties offences with case studies
penalties offences with case studiespenalties offences with case studies
penalties offences with case studies
 
It act
It actIt act
It act
 
Cyber law - Security aspects and Intellectual Property rights
Cyber law - Security aspects and Intellectual Property rights Cyber law - Security aspects and Intellectual Property rights
Cyber law - Security aspects and Intellectual Property rights
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 
Cyber crime 1
Cyber crime 1Cyber crime 1
Cyber crime 1
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Electronic evidence digital evidence in india
Electronic evidence  digital evidence in indiaElectronic evidence  digital evidence in india
Electronic evidence digital evidence in india
 
Electronic Evidence fraud conference
Electronic Evidence   fraud conferenceElectronic Evidence   fraud conference
Electronic Evidence fraud conference
 
India cyber
India cyberIndia cyber
India cyber
 
Www.cccindia.co corecentre database_docs_doc_files_india_cyber
Www.cccindia.co corecentre database_docs_doc_files_india_cyberWww.cccindia.co corecentre database_docs_doc_files_india_cyber
Www.cccindia.co corecentre database_docs_doc_files_india_cyber
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 
Neeraj aarora cyber_lawyer_section 65b_evidence act
Neeraj aarora cyber_lawyer_section 65b_evidence actNeeraj aarora cyber_lawyer_section 65b_evidence act
Neeraj aarora cyber_lawyer_section 65b_evidence act
 
Cyber law nepal
Cyber law nepalCyber law nepal
Cyber law nepal
 
Cyber laws - Ritu Gautam
Cyber laws - Ritu GautamCyber laws - Ritu Gautam
Cyber laws - Ritu Gautam
 
Cyber law/Business law
Cyber law/Business lawCyber law/Business law
Cyber law/Business law
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 
Modern Method for Detecting Web Phishing Using Visual Cryp-tography (VC) and ...
Modern Method for Detecting Web Phishing Using Visual Cryp-tography (VC) and ...Modern Method for Detecting Web Phishing Using Visual Cryp-tography (VC) and ...
Modern Method for Detecting Web Phishing Using Visual Cryp-tography (VC) and ...
 

Similar to CYBER LAW - With regard to jurisprudence relating to pornography, tick the most appropriate answer a. most jurisdictions punish dissemination of pornography, in some manner

SITA LAB REPORT (XYBER CRIME)
SITA LAB REPORT (XYBER CRIME)SITA LAB REPORT (XYBER CRIME)
SITA LAB REPORT (XYBER CRIME)Asish Verma
 
Chapter 4_Information, Control, and Privacy.pptx
Chapter 4_Information, Control, and Privacy.pptxChapter 4_Information, Control, and Privacy.pptx
Chapter 4_Information, Control, and Privacy.pptxnorwinadriatico
 
Rajveer choudhary cyber crime presentation
Rajveer choudhary cyber crime presentationRajveer choudhary cyber crime presentation
Rajveer choudhary cyber crime presentationRajveer Choudhary
 
CASE STUDY ON CYBER CRIME and characteristics .pptx
CASE STUDY ON CYBER CRIME and characteristics .pptxCASE STUDY ON CYBER CRIME and characteristics .pptx
CASE STUDY ON CYBER CRIME and characteristics .pptxAryamanSinghvi
 
Cyber crime in details with sections and clause
Cyber crime in details with sections and clauseCyber crime in details with sections and clause
Cyber crime in details with sections and clauseAvinash Tegginmani
 
irfhan k cyber law assignment
irfhan k cyber law assignment irfhan k cyber law assignment
irfhan k cyber law assignment Irfhan K Sorab
 
cyber law IT Act 2000
cyber law IT Act 2000cyber law IT Act 2000
cyber law IT Act 2000Yash Jain
 
LEGAL STRATEGIES FOR INDIAN BPOs – POST KKARAN BAHREE CASE
LEGAL STRATEGIES FOR INDIAN BPOs –POST KKARAN BAHREE CASELEGAL STRATEGIES FOR INDIAN BPOs –POST KKARAN BAHREE CASE
LEGAL STRATEGIES FOR INDIAN BPOs – POST KKARAN BAHREE CASEanthony4web
 
cyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimecyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimeSumedhaBhatt2
 
IPR & Cyber Laws (Practical Qustions Paper) [CBSGS - 75:25 Pattern] {2013-201...
IPR & Cyber Laws (Practical Qustions Paper) [CBSGS - 75:25 Pattern] {2013-201...IPR & Cyber Laws (Practical Qustions Paper) [CBSGS - 75:25 Pattern] {2013-201...
IPR & Cyber Laws (Practical Qustions Paper) [CBSGS - 75:25 Pattern] {2013-201...Mumbai B.Sc.IT Study
 
Nadeem cyber law assignment
Nadeem cyber law assignmentNadeem cyber law assignment
Nadeem cyber law assignmentNadeem Kazi
 
Awareness Against Cyber Crime
Awareness Against Cyber CrimeAwareness Against Cyber Crime
Awareness Against Cyber CrimeNithin Raj
 

Similar to CYBER LAW - With regard to jurisprudence relating to pornography, tick the most appropriate answer a. most jurisdictions punish dissemination of pornography, in some manner (20)

IPR & CYBER SECURITY.pptx
IPR & CYBER SECURITY.pptxIPR & CYBER SECURITY.pptx
IPR & CYBER SECURITY.pptx
 
SITA LAB REPORT (XYBER CRIME)
SITA LAB REPORT (XYBER CRIME)SITA LAB REPORT (XYBER CRIME)
SITA LAB REPORT (XYBER CRIME)
 
Cyber Crime
Cyber Crime Cyber Crime
Cyber Crime
 
Manoj 1
Manoj 1Manoj 1
Manoj 1
 
Chapter 4_Information, Control, and Privacy.pptx
Chapter 4_Information, Control, and Privacy.pptxChapter 4_Information, Control, and Privacy.pptx
Chapter 4_Information, Control, and Privacy.pptx
 
Introduction to cyber law.
Introduction to cyber law. Introduction to cyber law.
Introduction to cyber law.
 
Rajveer choudhary cyber crime presentation
Rajveer choudhary cyber crime presentationRajveer choudhary cyber crime presentation
Rajveer choudhary cyber crime presentation
 
CASE STUDY ON CYBER CRIME and characteristics .pptx
CASE STUDY ON CYBER CRIME and characteristics .pptxCASE STUDY ON CYBER CRIME and characteristics .pptx
CASE STUDY ON CYBER CRIME and characteristics .pptx
 
Cyber crime in details with sections and clause
Cyber crime in details with sections and clauseCyber crime in details with sections and clause
Cyber crime in details with sections and clause
 
irfhan k cyber law assignment
irfhan k cyber law assignment irfhan k cyber law assignment
irfhan k cyber law assignment
 
cyber law IT Act 2000
cyber law IT Act 2000cyber law IT Act 2000
cyber law IT Act 2000
 
LEGAL STRATEGIES FOR INDIAN BPOs – POST KKARAN BAHREE CASE
LEGAL STRATEGIES FOR INDIAN BPOs –POST KKARAN BAHREE CASELEGAL STRATEGIES FOR INDIAN BPOs –POST KKARAN BAHREE CASE
LEGAL STRATEGIES FOR INDIAN BPOs – POST KKARAN BAHREE CASE
 
cyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimecyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crime
 
Computer Crimes
Computer CrimesComputer Crimes
Computer Crimes
 
IPR & Cyber Laws (Practical Qustions Paper) [CBSGS - 75:25 Pattern] {2013-201...
IPR & Cyber Laws (Practical Qustions Paper) [CBSGS - 75:25 Pattern] {2013-201...IPR & Cyber Laws (Practical Qustions Paper) [CBSGS - 75:25 Pattern] {2013-201...
IPR & Cyber Laws (Practical Qustions Paper) [CBSGS - 75:25 Pattern] {2013-201...
 
Cyber security laws
Cyber security lawsCyber security laws
Cyber security laws
 
Nadeem cyber law assignment
Nadeem cyber law assignmentNadeem cyber law assignment
Nadeem cyber law assignment
 
It act 2000
It act 2000It act 2000
It act 2000
 
Awareness Against Cyber Crime
Awareness Against Cyber CrimeAwareness Against Cyber Crime
Awareness Against Cyber Crime
 
Introduction to cyber law.
Introduction to cyber law. Introduction to cyber law.
Introduction to cyber law.
 

Recently uploaded

Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingTeacherCyreneCayanan
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 

Recently uploaded (20)

Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 

CYBER LAW - With regard to jurisprudence relating to pornography, tick the most appropriate answer a. most jurisdictions punish dissemination of pornography, in some manner

  • 1. WE PROVIDE CASE STUDY ANSWERS, ASSIGNMENT SOLUTIONS, PROJECT REPORTS AND THESIS aravind.banakar@gmail.com ARAVIND - 09901366442 – 09902787224 CYBER LAW 1. Neha, a desktop publishing professional has made several authentic looking certificates Of major indian and foreign universities and has sold these counterfeit for large sums of money to at least 3 people in india. Neha had sent these certificates as email attachments to prospective customers. Select the most appropriate answer keeping the said facts in mind: a. neha would be punished for forgery for forging a document under the information technology act,2000 b. neha would be punished for forgery for forging a document under the indian the penal code,1860 c. neha would be punished for forgery for forging an electronic record under the indian penal code,1860 d. neha would be punished for forgery for forging an electronic record under the information Act,2000 2.With regard to jurisprudence relating to pornography, tick the most appropriate answer: a. most jurisdictions punish dissemination of pornography, in some manner b. all jurisdictions punish dissemination of Publishing of child pornography, c. in some jurisdictions dissemination and possession of actual child pornography as well as dissemination of simulated computer animated images depicting child pornography is penalized. d. some jurisdictions punish dissemination as well as possession of child pornography
  • 2. 3. Rita is not sure how exactly a digital signature system works. Help her to understand the process by chossing the most appropriate statement. a. A digital signature is formed subsequent to a message digest. b. A digital signature is formed by signing a message digest with a private key c. A digital signature is formed by making a message interact with a one way hash been certified by a certifying authority. d. A digital signature is verified by ausing hash function and public key 4.Select the most appropriate statement about a recognized foreign certifying authirty (CA) in india a. A recognized foreign CA is recognized in india as a CA. b. A recognized foreign CA is CA for purpose of the IT Act. c. A foreign CA is a CA previously approved by the central government before being recognized by the controller and is required to be notified in the official gazette. e. A recognized foreign CA is a CA recognized by the controller of certifying authorities and previously approved by the central government. 5. Digicert Ltd. Is a licensed certifying authority in india. Digicert obtained its license from the controller of certifying authority in 2001. However, business has not picked up and the company has gone into losses. The management of digicert wants to quit the business and wind up the company. Select the most appropriate statement from the following: a. Digicert can quit the business and wind up the company. b. Digicert has to notify the controller before terminating operations as a certifying authority. c. Digicert should notify the controller, advertise and give adequate compensation where required before ceasing to act as a certifying authority d. the certifying authority has to notify the controller, advertise and give adequate compensation where required before ceasing to as a certifying authority .
  • 3. 6. computer software can be a. copyrighted in india b. patened in india c. both copyrighted and patented in india d. both copyrighted abd patented in the united states of americs 7. ICANN’s UDRP requires a domain registrant to submit to mandatory administrative proceedings in case a. the registrant’s domain name is identical to a trademark in which a complaint has rights b. the registrant has no rights to the domain and has registered the domain in bad faith. c. the registrant has a deceptively similar trademark, has no rights to the domain and using the domain in bad faith. d. the registrant has registsred the domain name for disrupting the business of the competitor. 8. infecting someone’s computer virus can make a person liable to pay damages by way compensation up to a. A crore of rupees b. Two crore rupees c. three crore rupees d. four crore rupees 9. Rakesh has been accused by megaprogram corporation of reproducing and distributing their software Programs illegally. Rakesh is liable under: a. Section 63B of the indian copyright act 1957 b. Section 63 of the Indian Copyright Act 1957
  • 4. c. Section 66 of the Information Technology Act 2000 d. Section 66 of the Information Technology Act 2000 and Section 63 of copyright Act 1957 10. Hacking under the Information Technology Act 2000 Means a. Unauthorized access to another person’s computer system b. Deleting information stored in another person’s computer System. c. Knowingly or intentionally deleting information stored in another person’s computer system d. knowingly or intentionally deleting valuable information stored in another person’s computer system. 01. A young lady named ritika adjania found her profile in an online community named “1worldcom” on its website. Net. Her surprise turned to horror when she realized that the profile pained her as a person of dubious character whose only interest was money. The profile also “boasted” of her achievements which included defrauding a bank of rs.10 lakh and getting away with it. Ritika immediately informed “1worldcom” of the posting and requested them to remove it. The posting was removed the next day but reappeared a week later. It was again removed but reappeared two days later. Deeply hurt, Ritika filed a suit for defamation against “1worldcom”. With reference to jurisprudence of defamation cases, examine the liability of “1worldcom”. ( Marks – 10 ) 02 Rakesh had an appointment with Dr.Mina lahoti at the wockhardt hospital, Mumbai. While waiting for Dr.lahoti, Rakesh remembered that he had to email a document (that he was carrying in a floppy)to his office. As he looked around, he realized that there was a computer at the reception desk, which was switched on. However, the receptionist was nowhere to be seen. Rakesh immediately inserted the fooppy disk containing the document into the floppy drive of the computer at the reception desk. Just then, the receptionist entered and saw rakesh at the computer she immediately called the security guards and intimated the manager about the incident. The manager wants to take legal action against rakesh unauthorized access. Advise the manager.(Marks – 15)
  • 5. 03 Pooja has been assigned a project on “intellectual property rights associated with sami- condoctor technology”. She conducts a search on google and comes across many articles on the topic, she downloads the articles and uses them extensively in her project without taking permission from the authors of the articles. Pooja insists that since is using the articles for private use, she is not liable for any infringement. Is she right? Discuss (Mark- 15 ) 04 Section 29of the information technology act2000 confers power upon the controller of certifying authorities to investigate contraventions under the act. Section 78 confers power uupon a police or above to investigate any offence under the act. Rashmi suspects rakesh of creating and publishing digital signature certificates for fraudulent purpose, but she is confused about whom to approach for investigating the suspected crime. Clear rashmi confusion with detailed explanations (Marks – 15 ) WE PROVIDE CASE STUDY ANSWERS, ASSIGNMENT SOLUTIONS, PROJECT REPORTS AND THESIS aravind.banakar@gmail.com ARAVIND - 09901366442 – 09902787224
  • 6. 03 Pooja has been assigned a project on “intellectual property rights associated with sami- condoctor technology”. She conducts a search on google and comes across many articles on the topic, she downloads the articles and uses them extensively in her project without taking permission from the authors of the articles. Pooja insists that since is using the articles for private use, she is not liable for any infringement. Is she right? Discuss (Mark- 15 ) 04 Section 29of the information technology act2000 confers power upon the controller of certifying authorities to investigate contraventions under the act. Section 78 confers power uupon a police or above to investigate any offence under the act. Rashmi suspects rakesh of creating and publishing digital signature certificates for fraudulent purpose, but she is confused about whom to approach for investigating the suspected crime. Clear rashmi confusion with detailed explanations (Marks – 15 ) WE PROVIDE CASE STUDY ANSWERS, ASSIGNMENT SOLUTIONS, PROJECT REPORTS AND THESIS aravind.banakar@gmail.com ARAVIND - 09901366442 – 09902787224