Friday, November 6, 2015

M.C.A. (Part – III) (Semester – V),(IT Elective) CYBER LAW AND I.T. SECURITY,2014 Question Paper,Solapur University

Solapur University Question Paper
M.C.A. (Part – III) (Semester – V) Examination, 2014
(Commerce and Management Faculty)
(IT Elective) CYBER LAW AND I.T. SECURITY
Day and Date : Tuesday, 13-5-2014 Total Marks : 70
Time : 11.00 am to 2.00 pm.
Instructions : 1) Q. 1 and Q. 7 are compulsory.
2) Solve any two questions from Q. 2 to Q. 4.
3) Solve any one question from Q. 5 and Q. 6.
1. A) Fill in the blanks with correct option. 8
I) The objective of IT Act is to give legal recognition to _________ for accepting
any agreement via computer.
a) source code b) digital signature
c) email d) transaction
II) According to I.T. Act 2000, any company can store their data in __________
a) file b) database
c) secondary storage d) electronic storage
III) ___________ is a technique which converts plain text in to cipher text.
a) Encryption b) Digital signature
c) Decryption d) Cryptography
IV. In __________ only one key is used for encryption and decryption.
a) asymmetric cryptography b) symmetric cryptography
c) steganography d) RSA
V) For message authentication _____________ is used.
a) password b) digital signature
c) unique key d) algorithm
VI) Digital signature is issued by
a) programmer b) controller
c) state government d) certifying authority
Seat
No.
SLR-GL – 40 -2-
VII) RSA algorithm is developed in __________
a) 1980 b) 1979 c) 1978 d) 1977
VIII) Destroys or deletes or alters any information residing in a computer resource
is __________
a) tempering b) theft c) hijacking d) hacking
B) Define following : 6
I) Encryption
II) Digital Signature
III) Certifying Authority.
2. A) What is the IT Act 2000 ? 14
B) Explain Cyber Squatting and Reverse Hijacking.
3. A) Explain different function of Controller. 14
B) Explain Cyber Regulations Appellate Tribunal.
4. A) Explain the concept of Domain Names. 14
B) What do understand by encryption ? Explain.
5. What is digital signature ? Write the steps for creating and verifying digital
signature. 14
6. Explain cryptography and different cryptography algorithm. 14
7. Explain different Cyber Crimes. 14
__________________
Share This
Previous Post
Next Post

B.E Civil Engineer Graduated from Government College of Engineering Tirunelveli in the year 2016. She has developed this website for the welfare of students community not only for students under Anna University Chennai, but for all universities located in India. That's why her website is named as www.IndianUniversityQuestionPapers.com . If you don't find any study materials that you are looking for, you may intimate her through contact page of this website to know her so that it will be useful for providing them as early as possible. You can also share your own study materials and it can be published in this website after verification and reviewing. Thank you!

0 comments:

Pen down your valuable important comments below

Search Everything Here