1. Expand ARPANET - Advanced research project agency network
2. Expand the term internet - inter galastic network 3. Expand the term CERN - EUROPEAN COUNCIL FOR NETWORK RESEARCH 4. Who invented computer - Charles Babbage, 1834 5. Who used the term cyberspace for the first time. William Gibson 6. The first cybercrime was reported in the year, 1820 by Joseph Mary jacquard 7. Third generation computers used integrated circuits 8. The first virus was called iloveyou virus by Onel De Gujman 9. The term computer is defined under sec 2 (1) (i) of Information technology act, 2000 10. Hacking with computer system, data alteration is an offenseunder section 66 of IT act, 2000 11. Child pornography is an offenseunder section 67B of IT act 12. Section 66E deals with punishment of cyber privacy 13. Harassing someone through electronic messages is an offenseof 14. 15. Cyberbullying or cyber stalking 16. Email spamming refers to sending email to thousands of users similar to a chain letter. 17. Act of attempting to acquire information such as usernames and passwords is an offenseof cyber phishing 18. What is TROJAN HORSE - A programme in which malicious or harmful code is contained inside apparently harmless programming or data. 19. What is Malware - Any software intentionally designed to cause damage to a computer. 20. What is cyber squatting - Registering the names of a internet domain with intent to profit from the goodwill of a reputed company 21. Mention any 3 uses of the Internet? E commerce, e learning, knowledge sharing and social connectivity. 22. What are the 4 major categories of cyber crime. - against individuals, against the property, against organisation, against the government/ govt. or state functionaries. 23. Cyber crime against the government is also known as cyber terrorism 24. What is data leakage - An unauthorised transmission of confidential information from one organisation or another organisation. 25. What is cyber stalking - to stalk an individual through electronic devices with intention to harass or intimidate. 26. Mention any 2 forms of cyber crimes against property - cyber crimes against intellectual property and cyber squatting 27. Write down any 2 cyber attacks in the present generation. - cyber warfare, bitcoin wallet, android hacking, banking malware 28. Mention any four special characteristics of cyber crime. - 29. Give 2 Types of crimes against organisation - Email bombing and logic bombs. 30. What is Internet time theft - Unauthorised usage of internet hours by another person. 31. Expand ISP 32. Expand DOS - denial of service 33. What is LAN - Local area network (the network which is connected within 2 meters) 34. What is the name given by Charles Babbage to the computer he invented - AE 35. AI - Artificial intelligence 36. IOEs - Indicator of exposure 37. What is the basic component of first gen computer - vacuum tubes 38. 4th gen computers use 39. The first computer virus is created by Onel de Gujman 40. The IT act 2000 is based on the model of UNCITRAL, 1985 41. Damage to a computer is an offenseof section 43 of IT act, 2000 42. Sending offensive messages through any communication devices is an offenseunder sec 66A (now unconstitutional) 43. Section 66 C deals with Identity theft 44. Cyber terrorism shall be punishable under sec 66F 45. The use of internet to stalk an individual is termed cyber stalking 46. Use of electronic messaging systems to send unsolicited bulk messages are called Email bombing or cyber spamming 47. What is computer virus - A software usually hidden within another seemingly innocuous program that can produce copies of itself and insert them into other programes or files and that usually performs a harmful function. 48. Can emails be considered as evidence before court of law (true) 49. What is cyber space - refers to the virtual computer world and more specifically an eflectronic medium used to facilitate online communication. 50. Large networks of infected devices known as - BOTNETS 51. Eavesdropping attack begins with interception of network traffic. 52. Give one example of data spying - PEGASUS 53. What is cyber defamation - Defamation is an act of intentionally insulting, defaming or offending another individual through electronic devices. 54. What is a salami attack - 55. What is cyber contravention? - 56. Give two types of cybercrime against organisation - email bombing & logic bombs 57. Expand URL - Uniform resource locator 58. Who invented WWW 59. Who invented Loom machine - J.M.Jacquard 60. Second gen computers used - transistors 61. The term cyberspace was first coined by William Gibson 62. The IT act was first amended in 2008 63. Section 66A of IT act was struck down in case of Shreya Singal v UOI 64. Cyber terrorism dealt under section 66F of IT act 65. Email spamming 66. Cyber crime is a collective term which consists of cyber contraventions and cyber offences 67. What is E mail - Networked electronic mail 68. Trapdoor means - a secret entry into the program 69. The offenseunder Section 65 of the IT act is bailable or non-bailable offence? - Bailable offence 70. Child pornography is an offenseunder section 67B of IT act 71. Cyber squatting is associated with domain name dispute (true/false) - true 72. The receiving of unsolicited messages in large amount is known as email bombing or cyber spamming 73. The science of sending secret cypher and decoding it, is called cryptography or data encryption 74. Programs that multiply like virus but spread from computer to computer are called worms 75. What is TROJAN HORSE - it is a programme in which malicious or harmful code is contained inside apparently harmless programmes or data. 76. E commerce - buying and selling of goods online 77. What is e business - any process that a business organisation conduct over a computer mediated network 78. When did India adopt IT act 2000 - 17th October 2000 79. What is digital signature- It is a mathematical technique used to validate the authenticity and integrity of message software of digital document. 80. What is CCA - controller of certifying authority 81. Offences committed against computer hardware is called computer sabotage 82. Vandalism refers to destruction of public properties/ religious properties 83. What is cyber pornography - Dissemination/distribution/transmission of pornographic literature through computer resources 84. Where an employee steals a small amount of funds from several saving accounts he considered a guilty for the offense of salami slicing 85. Cyber phishing is a form of social engineering characterised by attempts to fraudulently acquire sensitive information such as passwords and credit card details . 86. Cyber terrorism involves highly targeted efforts made with the intention of terrorism 87. The first reported cybercrime took place in the year 1820 88. Mr.R has been accused by mega programme corporation of reproducing and distributing their software programmes illegally data leakage 89. Infecting someone’s computer with a computer virus can make a person liable to pay damages by way of compensation up to 2 lakhs 90. Feeling guilty or defensive about our internet use is a symptom of internet addiction 91. A programme that has capability to infect other programmes and make copies of itself and spread into other programmes is called 92. In cyber law terminology DOS means denial of services 93. Copyright gives the author of an original work exclusive right for a certain time period in relation to that work including it’s publication, distribution and adaptation. 94. What is the time limit for filing appeal against the order of CAT - 60 days 95. Specify 3 objectives of cyber laws - restore, retrieve and process the data 96. Mcafee is an example of - Antivirus programme / software 97. What is digital signature (DS) - It is a mathematical technique used to validate the authenticity and integrity of message software of digital document. 98. Which provision of IT act defines digital signature - 2(1)(p) 99. Which provision of IT act defines the term computer - 2(1)(i) 100. Use of computer resources to intimidate or coerce others is termed as - cyber Terrorism 101. When a person is harassed repeatedly by being followed, called or be return/retain? to he or she is a target of cyber stalking 102. Copying the material published on the internet as one’s own without proper acknowledgement is called 103. Hicklin test is a benchmark for obscenity