Solapur University Question Paper
M.C.A. (Part – III) (Semester – V) Examination, 2014
(Commerce and Management Faculty)
(IT Elective) CYBER LAW AND I.T. SECURITY
Day and Date : Tuesday, 13-5-2014 Total Marks : 70
Time : 11.00 am to 2.00 pm.
Instructions : 1) Q. 1 and Q. 7 are compulsory.
2) Solve any two questions from Q. 2 to Q. 4.
3) Solve any one question from Q. 5 and Q. 6.
1. A) Fill in the blanks with correct option. 8
I) The objective of IT Act is to give legal recognition to _________ for accepting
any agreement via computer.
a) source code b) digital signature
c) email d) transaction
II) According to I.T. Act 2000, any company can store their data in __________
a) file b) database
c) secondary storage d) electronic storage
III) ___________ is a technique which converts plain text in to cipher text.
a) Encryption b) Digital signature
c) Decryption d) Cryptography
IV. In __________ only one key is used for encryption and decryption.
a) asymmetric cryptography b) symmetric cryptography
c) steganography d) RSA
V) For message authentication _____________ is used.
a) password b) digital signature
c) unique key d) algorithm
VI) Digital signature is issued by
a) programmer b) controller
c) state government d) certifying authority
Seat
No.
SLR-GL – 40 -2-
VII) RSA algorithm is developed in __________
a) 1980 b) 1979 c) 1978 d) 1977
VIII) Destroys or deletes or alters any information residing in a computer resource
is __________
a) tempering b) theft c) hijacking d) hacking
B) Define following : 6
I) Encryption
II) Digital Signature
III) Certifying Authority.
2. A) What is the IT Act 2000 ? 14
B) Explain Cyber Squatting and Reverse Hijacking.
3. A) Explain different function of Controller. 14
B) Explain Cyber Regulations Appellate Tribunal.
4. A) Explain the concept of Domain Names. 14
B) What do understand by encryption ? Explain.
5. What is digital signature ? Write the steps for creating and verifying digital
signature. 14
6. Explain cryptography and different cryptography algorithm. 14
7. Explain different Cyber Crimes. 14
__________________
M.C.A. (Part – III) (Semester – V) Examination, 2014
(Commerce and Management Faculty)
(IT Elective) CYBER LAW AND I.T. SECURITY
Day and Date : Tuesday, 13-5-2014 Total Marks : 70
Time : 11.00 am to 2.00 pm.
Instructions : 1) Q. 1 and Q. 7 are compulsory.
2) Solve any two questions from Q. 2 to Q. 4.
3) Solve any one question from Q. 5 and Q. 6.
1. A) Fill in the blanks with correct option. 8
I) The objective of IT Act is to give legal recognition to _________ for accepting
any agreement via computer.
a) source code b) digital signature
c) email d) transaction
II) According to I.T. Act 2000, any company can store their data in __________
a) file b) database
c) secondary storage d) electronic storage
III) ___________ is a technique which converts plain text in to cipher text.
a) Encryption b) Digital signature
c) Decryption d) Cryptography
IV. In __________ only one key is used for encryption and decryption.
a) asymmetric cryptography b) symmetric cryptography
c) steganography d) RSA
V) For message authentication _____________ is used.
a) password b) digital signature
c) unique key d) algorithm
VI) Digital signature is issued by
a) programmer b) controller
c) state government d) certifying authority
Seat
No.
SLR-GL – 40 -2-
VII) RSA algorithm is developed in __________
a) 1980 b) 1979 c) 1978 d) 1977
VIII) Destroys or deletes or alters any information residing in a computer resource
is __________
a) tempering b) theft c) hijacking d) hacking
B) Define following : 6
I) Encryption
II) Digital Signature
III) Certifying Authority.
2. A) What is the IT Act 2000 ? 14
B) Explain Cyber Squatting and Reverse Hijacking.
3. A) Explain different function of Controller. 14
B) Explain Cyber Regulations Appellate Tribunal.
4. A) Explain the concept of Domain Names. 14
B) What do understand by encryption ? Explain.
5. What is digital signature ? Write the steps for creating and verifying digital
signature. 14
6. Explain cryptography and different cryptography algorithm. 14
7. Explain different Cyber Crimes. 14
__________________
0 comments:
Pen down your valuable important comments below