You are on page 1of 2

L/Sem VI/140(Old) Printed Pages : 4 Roll No.....................

L/Sem VI/140(Old)
(b) Cyber obscenity

lkbcj v’yhyrk LL.B. (Hons.) (Semester VI)


(c) Electronic Evidence
Examination, 2014-15
Law
bySDVªkfud lk{;
(Old Course 2009-10 Syllabus)
(d) Indian computer Emergency Team. (7 Papers System)
Hkkjrh; dEI;wVj vkikr ekspu nyA Paper : 36(a)
Information Technology Law
Time : Three Hours Full Marks : 80
(Write your Roll No. at the top immediately on the
receipt of this question paper)
Note: Answer any five questions. All questions
carry equal marks.
fdUgha ik¡p iz'uksa ds mRrj nhft,A lHkh iz'uksa ds
vad leku gaSA
1. Discuss the origin, objects and scope of the
Information Technology Act, 2000.
lwpuk izkS|ksfxdh vf/kfu;e 2000 ds mn~Hko] mn~ns';
,oa {ks= dh foospuk dhft,A
2. Discuss the concept of e-governance with
reference to the Information Technology Act,
2000.
4 500 P.T.O.
L/Sem VI/140(Old) L/Sem VI/140(Old)

lwpuk izk|
S ksfxdh vf/kfu;e] 2000 ds lUnHkZ esa bySDVªkfud 6. What do you understand by intermediary ?
'kklu ds fl)kUr dh foospuk dhft,A De scribe its liability in the light of the
Information Technology Act, 2000.
3. Define the term e-contract. Explain the
statutory provisions related to e-contract as e/;orhZ ls vki D;k le>rs gSa \ lwpuk izkS|ksfxdh
given under the Information Technology Act,
2000. vf/kfu;e] 2000 ds vkyksd esa blds mRrjnkf;Ro dk
bZ&lafonk dks ifjHkkf"kr dhft,A bZ&lafonk ls lEcfU/kr o.kZu dhft,A
lkafof/kd izko/kkuksa dks Li"V dhft, tSlk fd lwpuk
izkS|ksfxdh vf/kfu;e] 2000 esa of.kZr gSA 7. Discuss the efforts made at national and
international levels to curb the menace of
4. W h a t d o y o u u n d e r s t a n d b y C y b e r
Contravention ? Elaborate the process of cyber terrorism.
adjudication by referring to the relevant
lkbcj vkradckn ds mUewyu djus gsrq jk"Vªh; ,oa
provisions under the Information Technology
Act, 2000. vUrjkZ"Vªh; Lrj ij mBk;s x;s dneksa dh foospuk
lkbcj mYya?ku ls vki D;k le>rs gSa \ lwpuk dhft,A
iz k S | ks f xdh vf/kfu;e] 2000 ds vUrxZ r lq l a x r
izko/kkuksa dk mYys[k djrs gq, bldh U;k;fu.kZ;u izfØ;k 8. W r i t e s h o r t n o t e s o n a n y t w o o f t h e
dh O;k[;k dhft,A following :

5. Explain the functions and powers of the fuEufyf[kr esa ls fdUgha nks ij laf{kIr fVIif.k;k¡
Controllere of Certifying Authorities under the
fyf[k, %
Information Technology Act, 2000.
lwpuk izkS|ksfxdh vf/kfu;e] 2000 ds vUrxZr izek.kdrkZ (a) Digital Signature
izkf/kdkfj;ksa ds fu;a=d ds dk;ksZa ,oa 'kfDr;ksa dh O;k[;k vadh; fpUgd
dhft,A
2 3 P.T.O.

You might also like