TILAK MAHARASHTRA VIDYAPEETH, PUNE
BACHELOR OF LAWS (LL.B.) (Three Years Semester Pattern)/
B.A. LL.B. (ACADEMIC LAW)
(FIVE YEARS SEMESTER PATTERN) CREDIT SYSTEM
EXAMINATION : APRIL/MAY - 2018
THIRD/SEVENTH SEMESTER
Sub.: Cyber Law (LW -306/ LW-7006)
Date : 23/04/2018 Total Marks : 60 Time: 2.00 pm to 4.30 pm
Instructions: 1) All questions are compulsory.
2) Figures to the right indicate full marks.
Q. 1. Choose the correct option from the following. (10)
1) Use of Internet or other electronic means to stalk or harass an individual, a group of
individuals or an organization is called -----------.
a) Email bombing b) Spamming
c) Cyber stalking d) Phishing
2) The science of secret writing is called -----------
a) Cryptography b) Ergonomics
c) Stenography d) None of the above
3) A mathematical scheme for demonstrating the authenticity of a digital message or document is
called -----------
a) Encryption b) Decryption
c) Cryptography d) Digital Signature
4) The Indian parliament passed the Information Technology Bill which is regarded as the
mother legislation regulating the use of computers, Computer systems and computer networks
in the year -----------
a) 2000 b) 2001
c) 2002 d) 2003
5) -----------is the program which multiply like viruses but spread from computer to computer
a) Worms b) Virus
c) Boot d) All of the Above
6) -----------is type of crime which targets the computer
a) Money laundering b) Denial of service
c) Theft of service d) Intellectual property violations
7) -----------Article of UNICITRAL model Law focuses on electronic signature
a) 6 b) 8
c) 5 d) 7
8) -----------is known as malicious software
a) Illegal ware b) Bad ware
c) Malware d) Malicious ware
9) ----------- are online customers
a) Wholesaler b) Retailer
c) Consumer d) All the above
10) Information Technology Act was amended in the year -----------
a) 2007 b) 2008
c) 2009 d) None of the above
Q. 2. Answer the following in short. (Upto 30 words) (10)
1) Who is subscriber?
2) Who is Addressee?
3) What is Asymmetric crypto system?
4) Who is intermediary?
Cyber Law (LW – 306/7006) AGD/ I 1/2
BACHELOR OF LAWS (LL.B.) (Three Years Semester Pattern)/
B.A. LL.B. (ACADEMIC LAW)
(FIVE YEARS SEMESTER PATTERN) CREDIT SYSTEM
EXAMINATION : APRIL/MAY - 2018
THIRD/SEVENTH SEMESTER
Sub.: Cyber Law (LW -306/ LW-7006)
Date : 23/04/2018 Total Marks : 60 Time: 2.00 pm to 4.30 pm
Instructions: 1) All questions are compulsory.
2) Figures to the right indicate full marks.
Q. 1. Choose the correct option from the following. (10)
1) Use of Internet or other electronic means to stalk or harass an individual, a group of
individuals or an organization is called -----------.
a) Email bombing b) Spamming
c) Cyber stalking d) Phishing
2) The science of secret writing is called -----------
a) Cryptography b) Ergonomics
c) Stenography d) None of the above
3) A mathematical scheme for demonstrating the authenticity of a digital message or document is
called -----------
a) Encryption b) Decryption
c) Cryptography d) Digital Signature
4) The Indian parliament passed the Information Technology Bill which is regarded as the
mother legislation regulating the use of computers, Computer systems and computer networks
in the year -----------
a) 2000 b) 2001
c) 2002 d) 2003
5) -----------is the program which multiply like viruses but spread from computer to computer
a) Worms b) Virus
c) Boot d) All of the Above
6) -----------is type of crime which targets the computer
a) Money laundering b) Denial of service
c) Theft of service d) Intellectual property violations
7) -----------Article of UNICITRAL model Law focuses on electronic signature
a) 6 b) 8
c) 5 d) 7
8) -----------is known as malicious software
a) Illegal ware b) Bad ware
c) Malware d) Malicious ware
9) ----------- are online customers
a) Wholesaler b) Retailer
c) Consumer d) All the above
10) Information Technology Act was amended in the year -----------
a) 2007 b) 2008
c) 2009 d) None of the above
Q. 2. Answer the following in short. (Upto 30 words) (10)
1) Who is subscriber?
2) Who is Addressee?
3) What is Asymmetric crypto system?
4) Who is intermediary?
Cyber Law (LW – 306/7006) AGD/ I 1/2