Email: smu.assignment@gmail.com
Mob: +919741410271 / +918722788493
1. Neha, a desktop
publishing professional has made several authentic looking certificates Of omajor
indian and foreign universities and has sold these counterfeit for large sums
of money to at least 3 people in india. Neha had sent these
certificates as email attachments to prospective customers. Select the most
appropriate answer keeping the said facts in mind:
a)
neha would be punished for forgery for
forging a document under the information technology act,2000
b)
neha would be punished for forgery for
forging a document under the indian the penal code,1860
c)
neha would be punished for forgery for
forging an electronic record under the indian penal code,1860
d)
neha would be punished for forgery for
forging an electronic record under the information Act,2000
2. With regard to
jurisprudence relating to pornography, tick the most appropriate answer:
a)
most jurisdictions punish dissemination
of pornography, in some manner
b)
all jurisdictions punish dissemination
of Publishing of child pornography,
c)
in some jurisdictions dissemination and
possession of actual child pornography as well as dissemination of simulated
computer animated images depicting child pornography is penalized.
d)
some jurisdictions punish dissemination
as well as possession of child pornography
3. Rita is not sure how
exactly a digital signature system works. Help her to understand the process by
chossing the most appropriate statement.
a)
A digital signature is formed subsequent
to a message digest.
b)
A digital signature is formed by signing
a message digest with a private key
c)
A digital signature is formed by making
a message interact with a one way hash been certified by a certifying
authority.
d)
A digital signature is verified by
ausing hash function and public key
4.Select the most
appropriate statement about a recognized foreign certifying authirty (CA) in india
a)
A recognized foreign CA is recognized in
india as a CA.
b)
A recognized foreign CA is CA for
purpose of the IT Act.
c)
A foreign CA is a CA previously approved
by the central government before being recognized by the controller and is required to be notified
in the official gazette.
d)
A recognized foreign CA is a CA
recognized by the controller of certifying authorities and previously approved
by the central government.
5. Digicert Ltd. Is a
licensed certifying authority in india. Digicert obtained its license from the
controller of certifying authority in 2001. However, business has not picked up
and the company has gone into losses. The management of digicert wants to quit
the business and wind up the company. Select the most appropriate statement
from the following:
a)
Digicert can quit the business and wind
up the company.
b)
Digicert has to notify the controller
before terminating operations as a certifying authority.
c)
Digicert should notify the controller,
advertise and give adequate compensation where required before ceasing to act
as a certifying authority
d)
the certifying authority has to notify
the controller, advertise and give adequate compensation where required before
ceasing to as a certifying authority .
6. Computer software
can be
a)
copyrighted in india
b)
patened in india
c)
both copyrighted and patented in india
d)
both copyrighted abd patented in the
united states of americs
7. ICANN’s UDRP requires a domain registrant to
submit to mandatory administrative proceedings in case
a)
the registrant’s domain name is
identical to a trademark in which a complaint has rights
b)
the registrant has no rights to the
domain and has registered the domain in bad faith.
c)
the registrant has a deceptively similar
trademark, has no rights to the domain and using the domain in bad faith.
d)
the registrant has registsred the domain
name for disrupting the business of the
competitor.
8. Infecting someone’s
computer virus can make a person liable to pay damages by way compensation up
to
a)
A crore of rupees
b)
Two crore rupees
c)
three crore rupees
d)
four crore rupees
9. Rakesh has been
accused by megaprogram corporation of reproducing and distributing their
software Programs illegally. Rakesh is liable under:
a)
Section 63B of the indian copyright act
1957
b)
Section 63 of the Indian Copyright Act
1957
c)
Section 66 of the Information Technology
Act 2000
d)
Section 66 of the Information Technology
Act 2000 and Section 63 of copyright Act 1957
10. Hacking under the
Information Technology Act 2000 Means
a)
Unauthorized access to another person’s
computer system
b)
Deleting information stored in another
person’s computer System.
c)
Knowingly or intentionally deleting
information stored in another person’s computer system
d)
knowingly or intentionally deleting
valuable information stored in another person’s computer system.
11. A young lady named
ritika adjania found her profile in an online community named “1worldcom” on
its website. Net. Her surprise turned to horror when she realized that the
profile pained her as a person of dubious character whose only interest was
money. The profile also “boasted” of her achievements which included defrauding
a bank of rs.10 lakh and getting away
with it. Ritika immediately informed “1worldcom” of the posting and requested
them to remove it. The posting was removed the next day but reappeared a week
later. It was again removed but reappeared two days later. Deeply hurt, Ritika
filed a suit for defamation against “1worldcom”. With reference to
jurisprudence of defamation cases, examine the liability of “1worldcom”.
12. Rakesh had an
appointment with Dr.Mina lahoti at the wockhardt hospital, Mumbai. While
waiting for Dr.lahoti, Rakesh remembered that he had to email a document (that
he was carrying in a floppy)to his office. As he looked around, he realized
that there was a computer at the reception desk, which was switched on.
However, the receptionist was nowhere to be seen. Rakesh immediately inserted
the fooppy disk containing the document into the floppy drive of the computer at the reception desk. Just
then, the receptionist entered and saw rakesh at the computer she immediately
called the security guards and intimated the manager about the incident. The
manager wants to take legal action against rakesh unauthorized access. Advise
the manager.
13. Pooja has been
assigned a project on “intellectual property rights associated with sami-
condoctor technology”. She conducts a search on google and comes across many
articles on the topic, she downloads the articles and uses them extensively in
her project without taking permission from the authors of the articles. Pooja
insists that since is using the articles for private use, she is not liable for
any infringement. Is she right? Discuss.
14. Section 29of the
information technology act2000 confers power upon the controller of certifying
authorities to investigate contraventions under the act. Section 78 confers
power uupon a police or above to investigate any offence under the act. Rashmi
suspects rakesh of creating and publishing digital signature certificates for
fraudulent purpose, but she is confused about whom to approach for
investigating the suspected crime. Clear rashmi confusion with detailed
explanations.
No comments:
Post a Comment