Practice Test


Q1) Technology has helped in creating: Show Answer


Q2) Cyber space is a ________ medium. Show Answer


Q3) India is the 12th nation in enactment of cyber law with______. Show Answer


Q4) There is/are _____ no. of member Cyber Appellate Tribunal. Show Answer


Q5) It is a notional environment in which communication over computer networks occur. Show Answer


Q6) Cyber crime is generally used to describe _______ in which computer or/and network is a tool, a target or a place of crime activity Show Answer


Q7) ________ is not the crime under individual property. Show Answer


Q8) The crime against society is: Show Answer


Q9) The scope and relevance of cyber law touches those areas which have a _________ Show Answer


Q10) Legal Recognition of digital structure comes under: Show Answer


Q11) Computer is a ________ speed data processing device. Show Answer


Q12) The dynamic virtual space created by machine clones is termed as ________. Show Answer


Q13) The new oxford dictionary defines cyber space as the _____ environment. Show Answer


Q14) Cyber space is a _______ medium. Show Answer


Q15) Cyber space has gravity. Show Answer


Q16) Cyber space have boundaries. Show Answer


Q17) Cyber space is combination of _______ Show Answer


Q18) Cyber space is a physical world Show Answer


Q19) ______ means any electronic, magnetic optical or other high speed data processing device. Show Answer


Q20) _______ key means a key used to create a digital signature. Show Answer


Q21) _______ key means a key used to verify a digital signature. Show Answer


Q22) ______ means the interconnection of one or more computer. Show Answer


Q23) William Gibson’s Neuromancer was published in the year _______. Show Answer


Q24) The word Cyberspace was first appeared in _________. Show Answer


Q25) “Cyberspace” is the national environment in which communication over computer networks occurs; is defined in _______. Show Answer


Q26) The aim of cyber laws is to ______ the existing laws. Show Answer


Q27) Which of the following are disturbing thing that happen in cyber in space Show Answer


Q28) There are how many structures, which govern online criminal liability? Show Answer


Q29) ________ chapters deal with various cyber crime and IT Act 2000. Show Answer


Q30) The first draft of cyber laws was created by the ministry of commerce government of India as Show Answer


Q31) The It act 2000 was passed in _______ Show Answer


Q32) The IT Act 2000 amended which of the following Act Show Answer


Q33) Which of the following Acts are not amended for the IT act 2000? Show Answer


Q34) Patents confer _______ rights than copyrights. Show Answer


Q35) Patents confer weak right than copyrights. Show Answer


Q36) _______ means crime where computers are the tools of the crime. Show Answer


Q37) Which of the following is a crime against an individual? Show Answer


Q38) E- governance means _________. Show Answer


Q39) Online contract are illegal in India. Show Answer


Q40) Online contracts are not valid contracts as per contract Act 1872.
Show Answer


Q41) Online contract also requires all the essential elements of a valid contract Show Answer


Q42) The promotion of electronic governance is one of the prime objectives of _______. Show Answer


Q43) Full form of DNS is __________. Show Answer


Q44) Full form of IP is: Show Answer


Q45) Digital Signature, like written signature, used to provide authentication of the associate input, usually called as- Show Answer


Q46) The _____ and _____ are unique to the subscriber and constitute a function key pair. Show Answer


Q47) Statute which govern online criminal liability include: Show Answer


Q48) An appeal for the order of Cyber Appellate can be filled in: Show Answer


Q49) The full form of (UNCITRAL) is: Show Answer


Q50) Which of the following is / are the objectives of the IT Act, 2000? Show Answer


Q51) Which of the following is / are not the objectives of the Act? Show Answer


Q52) . Which of the following are the features of the IT Act, 2000? Show Answer


Q53) The IT Act, 2000 extends to ________. Show Answer


Q54) . IT Act 2000 does not take citizenship into account. Show Answer


Q55) ______ means gaining entry into computer system. Show Answer


Q56) ______ means a person in whose name the digital signature certificate is issued. Show Answer


Q57) ________ are used to provide authentication of the message. Show Answer


Q58) The IT Act 200 deals with digital signatures under section ________. Show Answer


Q59) _______ is the process to confirm the identity of a person. Show Answer


Q60) Which of the following is / are not the area of concern for cyber law? Show Answer


Q61) Which of the following is / are the areas of concern for cyber law? Show Answer


Q62) _______ is the commercial transaction of services in an electronic format.
Show Answer


Q63) The word cyberspace first appeared in _____ in his science fiction_____ punished in _____. Show Answer


Q64) The ____ of the English defines ‘ cyberspace’ as the national environment in which communication over computer network occurs . Show Answer


Q65) The ____ of the English defines ‘ cyberspace’ as the national environment in which communication over computer network occurs . Show Answer


Q66) India is the _____ in enactment of cyber law with the passage of Information Technology Act, 2000. Show Answer


Q67) “ Information Technology Bill 1999” was placed before the Parliament in _______ and passed in _______. Show Answer


Q68) The objective of the Information Technology Act, 2000.
(I) To amend the Indian Penal Code 1860, the Indian Evidence Act 1872, the Bankers’ Books Evidence Act 1891, and the Reserve Bank of India Act 1934.
(II) To facilitate electronic storage of data.
(III) To increase the incomes of E- Commerce site operators .
(Iv) To facilitate and give legal sanction to electronic fund transfer.
(v) To give recognition to execution of a Will under the Indian Succession Act, 1925 including any other testamentary disposition by whatever name called.
Show Answer


Q69) A provision has been made for the establishment of _____ under the Information Technology Act, 2000 Show Answer


Q70) As per section 1 (2) of the Information Technology Act, 2000, it extend to the ____ Show Answer


Q71) Which of the following statement is true in relation to the Information Technology Act,2000? Show Answer


Q72) As provided in section 1(4) of the Information Technology Act, 2000, the provision of the Information Technology Act,2000 shall not apply to certain document . They are-
(W) Execution of Negotiable Instrument like cheques.
(X) Execution of a Power of Attorney under the Powers of Attorney Act,1882.
(Y) Creation of trust under Indian Trust Act 1882.
(Z) Contract for the sale of conveyance of moveable property
Show Answer


Q73) As per Section 2(1) (a) of the Information Technology Act, 2000,_______ means gaining entry into, instruction or communicating with the logical, arithmetical or memory function resources of a computer, computer system or computer network. Show Answer


Q74) Gibson portrayed cyber space as a_______ virtual land space created by network of computers . Show Answer


Q75) As per section 2 (1) (f) of the Information Technology Act, 2000 ,_______ means a system of a secure key pair consisting of a private key for creating a digital signature and a public key to verify the digital signature Show Answer


Q76) As per section 2 (1)(f) of the Information Technology Act, 2000, _____means any electronic , magnetic, optical or other high speed data processing device or system which performs logical arithmetic and memory functions by manipulation of electronic, magnetic or optical impulses. It includes all input, output, processing, storage, computer software or communication facilities which are connected or related to the computer in a computer system or computer network . Show Answer


Q77) Statement X:
Private key can verify a digital signature created by public key .
Statement Y :
Public key means the key of a key pairs used to create a digital signature .
Select the correct answer from the options given below : Show Answer


Q78) Authentication is a process used to ___ Show Answer


Q79) Legal recognition to Electronic Records is granted under ______ of the Information Technology Act, 2000. Show Answer


Q80) Where any law provides for the filing of any form, then filing of such form in electronic mode is allowed under - Show Answer


Q81) Where any law provides that any rule, regulation, order, bye-laws, notification or any other matter shall be punished in the official Gazette,then, such requirement shall be deemed to have been satisfied if such rule, regulation, order, bye-law, notification or any other matter is punished in the Show Answer


Q82) _______ defined simply, is the commercial transaction of services in an electronic format. Show Answer


Q83) Statement I:
Programmes are covered under copyright law, whereas,algorithms and techniques qualify for patenting.
Statement II:
Software is granted patents for industrial processes.
Select the correct answer from the options given below - Show Answer


Q84) _______ says that since the internet is composed of computers, crimes occurring on the internet are computer crimes. He also says that a computer can be subject of a crime by being stolen or damaged, it can be the site of crime such as fraud or copyright infringement, or it can be the instrument of a crime such as when it is used to access other machines or store information on illegally. Show Answer


Q85) Marc M Goodman says that a computer crime can be classified into ____
(1) As crime where computer is target
(2) Crime where computer is the tool of the crime .
(3) Crimes where computer is instrumental.
Select the correct answer from the options given below - Show Answer


Q86) Which of the following cybercrime may be categorized as “ crime committed against individuals person”?
(W) Cyber –stalking
(X) Computer vandalism
(Y) Harassment via e- mail
(Z) Online gambling
Select the correct answer from the options given below - Show Answer


Q87) Which of the penalty is applicable for "damage to computer, computer system" under the information Technology Act, 2000 ? Show Answer


Q88) Hacking of computer system is liable to penalty of _____ Show Answer


Q89) Publishing of information which is “ obscene in electronic form” for the first time is liable to penalty of____ Show Answer


Q90) Publishing of information which is "obscene in electronic form" for the second time is liable to penalty of ____ Show Answer


Q91) Whoever knowingly creates, publishes or otherwise makes available a digital signature certificate for any fraudulent or unlawful purpose shall be liable to____ Show Answer


Q92) Hacking of computer system is liable to penalty of______ Show Answer


Q93) Hacking of computers system is liable to penalty under ______ of the Information Technology Act, 2000. Show Answer


Q94) Whoever contravenes any rules or regulations made under the Information Technology Act, 2000,for the contravention of which no penalty has been separately provided, shall be liable Show Answer


Q95) Controlling of Certifying Authority is appointed by _____ Show Answer


Q96) Who shall be the repository of all Digital Signature Certificates? Show Answer


Q97) A Cyber Appellate Tribunal shall consist of ____ Show Answer


Q98) A person shall not be qualified for appointment as the presiding Officer of a Cyber Appellate Tribunals unless he is, or has been is qualified to be - Show Answer


Q99) A person shall not be qualified for appointment as the presiding Officer of a Cyber Appellate Tribunal unless he is or has been a member of the Indian Legal service and is holding or has held a post in Grade I of that service for at least _____ Show Answer


Q100) The presiding Officer of a Cyber Appellate Tribunal shall hold office for a term of _____ from the date on which he enters upon his officer or until he attains the age of _______ whichever is earlier . Show Answer


Q101) Any person aggrieved by an order made by Controller or an adjudicating officer under this Act may prefer an appeal to_____ Show Answer


Q102) No appeal shall lie to the Cyber Appellate Tribunal from an order made by an adjudicating officer with the consent of the parties. Show Answer


Q103) Every appeal to the Cyber Appellate Tribunal shall be filed within a period of _____ from the date on which a copy of order made by the Controller or the adjudicating officer is received by the person aggrieved and it shall be in such form and be accompanied by such fee as may be prescribed Show Answer


Q104) The appeal filed before the Cyber Appellate Tribunal shall be dealt with by it as expeditiously as possible and endeavor shall be made by it to dispose of the appeal finally within _____from the date of receipt of the appeal Show Answer


Q105) The Cyber Appellate Tribunal _____ Show Answer


Q106) The appellate may ____ Show Answer


Q107) Any person aggrieved by any decision or order of the Cyber Appellate Tribunal may file an appeal to the High Court within _______ from the date of communication of the decision or order of the Cyber Appellate Tribunal . However, the High court may , if it is satisfied that the Appellate was perverted by sufficient cause from filling the appeal within the said period allow it to be filled within a further period not exceeding ______ Show Answer


Q108) Under the Information Technology Act,2000, appeal to the High Court may be filed on_____ Show Answer


Q109) Amrish was found guilty of damaging the data stored in a computer . The adjudicating officer fined him Rs. 100,000 and directed the amount to be paid to the aggrieved person. Advice Amrish about the course of action against this decision under the Information Technology Act,2000 Show Answer


Q110) One morning scientists at an atomic research center found a rude- nuclear message splashed across their computer screens . Someone had breached the atomic research center’s advanced security system and sensitive mail. What offense has been committed in the atomic research center ? Show Answer


Q111) Chanchal sues Indian Online Limited. (IOL) for allowing a subscriber Rajat to use its chat room for making video tapes and photographs of child pornography in which Chanchal’s minor son appears . The complaint alleged that IOL was negligent per se in allowing Rajat to use its facilities for producing obscene materials, therefore, is liable under criminal law and under the Information Technology Act,2000. IOL contends that it has no knowledge of such transmission of unlawful Information . Decide the liability of IOL . Show Answer