Professional Documents
Culture Documents
L/Sem VI/140(Old)
(b) Cyber obscenity
lwpuk izk|
S ksfxdh vf/kfu;e] 2000 ds lUnHkZ esa bySDVªkfud 6. What do you understand by intermediary ?
'kklu ds fl)kUr dh foospuk dhft,A De scribe its liability in the light of the
Information Technology Act, 2000.
3. Define the term e-contract. Explain the
statutory provisions related to e-contract as e/;orhZ ls vki D;k le>rs gSa \ lwpuk izkS|ksfxdh
given under the Information Technology Act,
2000. vf/kfu;e] 2000 ds vkyksd esa blds mRrjnkf;Ro dk
bZ&lafonk dks ifjHkkf"kr dhft,A bZ&lafonk ls lEcfU/kr o.kZu dhft,A
lkafof/kd izko/kkuksa dks Li"V dhft, tSlk fd lwpuk
izkS|ksfxdh vf/kfu;e] 2000 esa of.kZr gSA 7. Discuss the efforts made at national and
international levels to curb the menace of
4. W h a t d o y o u u n d e r s t a n d b y C y b e r
Contravention ? Elaborate the process of cyber terrorism.
adjudication by referring to the relevant
lkbcj vkradckn ds mUewyu djus gsrq jk"Vªh; ,oa
provisions under the Information Technology
Act, 2000. vUrjkZ"Vªh; Lrj ij mBk;s x;s dneksa dh foospuk
lkbcj mYya?ku ls vki D;k le>rs gSa \ lwpuk dhft,A
iz k S | ks f xdh vf/kfu;e] 2000 ds vUrxZ r lq l a x r
izko/kkuksa dk mYys[k djrs gq, bldh U;k;fu.kZ;u izfØ;k 8. W r i t e s h o r t n o t e s o n a n y t w o o f t h e
dh O;k[;k dhft,A following :
5. Explain the functions and powers of the fuEufyf[kr esa ls fdUgha nks ij laf{kIr fVIif.k;k¡
Controllere of Certifying Authorities under the
fyf[k, %
Information Technology Act, 2000.
lwpuk izkS|ksfxdh vf/kfu;e] 2000 ds vUrxZr izek.kdrkZ (a) Digital Signature
izkf/kdkfj;ksa ds fu;a=d ds dk;ksZa ,oa 'kfDr;ksa dh O;k[;k vadh; fpUgd
dhft,A
2 3 P.T.O.