You are on page 1of 5

ONE MARK

1. Expand ARPANET - Advanced research project agency network


2. Expand the term internet - inter galastic network
3. Expand the term CERN - EUROPEAN COUNCIL FOR NETWORK
RESEARCH
4. Who invented computer - Charles Babbage, 1834
5. Who used the term cyberspace for the first time. William Gibson
6. The first cybercrime was reported in the year, 1820 by Joseph Mary jacquard
7. Third generation computers used integrated circuits
8. The first virus was called iloveyou virus by Onel De Gujman
9. The term computer is defined under sec 2 (1) (i) of Information technology act, 2000
10. Hacking with computer system, data alteration is an offenseunder section 66 of IT
act, 2000
11. Child pornography is an offenseunder section 67B of IT act
12. Section 66E deals with punishment of cyber privacy
13. Harassing someone through electronic messages is an offenseof
14.
15. Cyberbullying or cyber stalking
16. Email spamming refers to sending email to thousands of users similar to a chain
letter.
17. Act of attempting to acquire information such as usernames and passwords is an
offenseof cyber phishing
18. What is TROJAN HORSE - A programme in which malicious or harmful code is
contained inside apparently harmless programming or data.
19. What is Malware - Any software intentionally designed to cause damage to a
computer.
20. What is cyber squatting - Registering the names of a internet domain with intent
to profit from the goodwill of a reputed company
21. Mention any 3 uses of the Internet? E commerce, e learning, knowledge sharing
and social connectivity.
22. What are the 4 major categories of cyber crime. - against individuals, against the
property, against organisation, against the government/ govt. or state
functionaries.
23. Cyber crime against the government is also known as cyber terrorism
24. What is data leakage - An unauthorised transmission of confidential information
from one organisation or another organisation.
25. What is cyber stalking - to stalk an individual through electronic devices with
intention to harass or intimidate.
26. Mention any 2 forms of cyber crimes against property - cyber crimes against
intellectual property and cyber squatting
27. Write down any 2 cyber attacks in the present generation. - cyber warfare, bitcoin
wallet, android hacking, banking malware
28. Mention any four special characteristics of cyber crime. -
29. Give 2 Types of crimes against organisation - Email bombing and logic bombs.
30. What is Internet time theft - Unauthorised usage of internet hours by another
person.
31. Expand ISP
32. Expand DOS - denial of service
33. What is LAN - Local area network (the network which is connected within 2 meters)
34. What is the name given by Charles Babbage to the computer he invented - AE
35. AI - Artificial intelligence
36. IOEs - Indicator of exposure
37. What is the basic component of first gen computer - vacuum tubes
38. 4th gen computers use
39. The first computer virus is created by Onel de Gujman
40. The IT act 2000 is based on the model of UNCITRAL, 1985
41. Damage to a computer is an offenseof section 43 of IT act, 2000
42. Sending offensive messages through any communication devices is an offenseunder
sec 66A (now unconstitutional)
43. Section 66 C deals with Identity theft
44. Cyber terrorism shall be punishable under sec 66F
45. The use of internet to stalk an individual is termed cyber stalking
46. Use of electronic messaging systems to send unsolicited bulk messages are called
Email bombing or cyber spamming
47. What is computer virus - A software usually hidden within another seemingly
innocuous program that can produce copies of itself and insert them into other
programes or files and that usually performs a harmful function.
48. Can emails be considered as evidence before court of law (true)
49. What is cyber space - refers to the virtual computer world and more specifically an
eflectronic medium used to facilitate online communication.
50. Large networks of infected devices known as - BOTNETS
51. Eavesdropping attack begins with interception of network traffic.
52. Give one example of data spying - PEGASUS
53. What is cyber defamation - Defamation is an act of intentionally insulting, defaming
or offending another individual through electronic devices.
54. What is a salami attack -
55. What is cyber contravention? -
56. Give two types of cybercrime against organisation - email bombing & logic bombs
57. Expand URL - Uniform resource locator
58. Who invented WWW
59. Who invented Loom machine - J.M.Jacquard
60. Second gen computers used - transistors
61. The term cyberspace was first coined by William Gibson
62. The IT act was first amended in 2008
63. Section 66A of IT act was struck down in case of Shreya Singal v UOI
64. Cyber terrorism dealt under section 66F of IT act
65. Email spamming
66. Cyber crime is a collective term which consists of cyber contraventions and cyber
offences
67. What is E mail - Networked electronic mail
68. Trapdoor means - a secret entry into the program
69. The offenseunder Section 65 of the IT act is bailable or non-bailable offence? -
Bailable offence
70. Child pornography is an offenseunder section 67B of IT act
71. Cyber squatting is associated with domain name dispute (true/false) - true
72. The receiving of unsolicited messages in large amount is known as email bombing or
cyber spamming
73. The science of sending secret cypher and decoding it, is called cryptography or data
encryption
74. Programs that multiply like virus but spread from computer to computer are called
worms
75. What is TROJAN HORSE - it is a programme in which malicious or harmful code
is contained inside apparently harmless programmes or data.
76. E commerce - buying and selling of goods online
77. What is e business - any process that a business organisation conduct over a
computer mediated network
78. When did India adopt IT act 2000 - 17th October 2000
79. What is digital signature- It is a mathematical technique used to validate the
authenticity and integrity of message software of digital document.
80. What is CCA - controller of certifying authority
81. Offences committed against computer hardware is called computer sabotage
82. Vandalism refers to destruction of public properties/ religious properties
83. What is cyber pornography - Dissemination/distribution/transmission of
pornographic literature through computer resources
84. Where an employee steals a small amount of funds from several saving accounts he
considered a guilty for the offense of salami slicing
85. Cyber phishing is a form of social engineering characterised by attempts to
fraudulently acquire sensitive information such as passwords and credit card details .
86. Cyber terrorism involves highly targeted efforts made with the intention of
terrorism
87. The first reported cybercrime took place in the year 1820
88. Mr.R has been accused by mega programme corporation of reproducing and
distributing their software programmes illegally data leakage
89. Infecting someone’s computer with a computer virus can make a person liable to pay
damages by way of compensation up to 2 lakhs
90. Feeling guilty or defensive about our internet use is a symptom of internet addiction
91. A programme that has capability to infect other programmes and make copies of itself
and spread into other programmes is called
92. In cyber law terminology DOS means denial of services
93. Copyright gives the author of an original work exclusive right for a certain time
period in relation to that work including it’s publication, distribution and adaptation.
94. What is the time limit for filing appeal against the order of CAT - 60 days
95. Specify 3 objectives of cyber laws - restore, retrieve and process the data
96. Mcafee is an example of - Antivirus programme / software
97. What is digital signature (DS) - It is a mathematical technique used to validate the
authenticity and integrity of message software of digital document.
98. Which provision of IT act defines digital signature - 2(1)(p)
99. Which provision of IT act defines the term computer - 2(1)(i)
100. Use of computer resources to intimidate or coerce others is termed as - cyber
Terrorism
101. When a person is harassed repeatedly by being followed, called or be
return/retain? to he or she is a target of cyber stalking
102. Copying the material published on the internet as one’s own without proper
acknowledgement is called
103. Hicklin test is a benchmark for obscenity

You might also like