[This question paper contains 4 printed pages.]
Sr.No. of Question Paper : 1859 Gc-3 Your Roll No.
Unique Paper Code : $2413301
Name of the Paper : CYBER CRIMES AND LAWS
Name‘of the Course: B.COM (P)
Semester 2M
Duration : 3 Hours Maximum Marks : 75
Instructions for Candidates
1
Write your Roll No. on the top immediately on receipt of this question paper.
2. Attempt all the questions.
3. All questions carry equal marks.
4. Answers may be written either in English or Hindi; but the same medium should
be used throughout the paper.
oral & fay fea
Le wea & fed & ae fey ay Pair ear oe oT sepia faery 1
2 wit wei S ork GA °
3. wit wei Ss oie wrt a
4 REET aT Te SHG aT FA fae eae eT A fare, afar wet Tet a ETT eH
Bat ake
(a) What are the different categories of cyber criminals. Explain the various
techniques to commit cybercrimes. (9)
(b) What is data security? Explain different methods of protection of computer
data. (6)
(&) weet arated at fatter Aftrat ear 8? area aaa wet at far carte at
aren aif
(at) Ber wen en 8? Bae Far F wer AAT AR A aren wf
OR
(@)_ How is a Controller of Certifying Authority appointed? What are his functions
under the IT Act, 2000. (9)
PTO.1859 2
(b) Briefly discuss the following: (23-6)
() Meaning and Punishment for publishing or transmitting obscene material
in electronic form.
Gi) Tempering with Computer Source Documents
(=) fréae ay wart siftrant at Agha fre wer at ot 2? quar shire
sfaftan, 2000 & sina sad ad ear 27
(@) Prafateea we wae at ) Explain the rules laid down in the IT Act in relation to the following:
(i) Time of dispatch and receipt of electronic record
Gi) Place of dispatch and receipt of electronic record (2x3=6)
(&) ‘area Gen’ we Bo ae aT ard F? wpe en Gad wa wart At wad %
mare afsre
(a) ern seb afahas F Prafettea Baar F Pulte fey ay Pelt A ee
Aire:
(i) sages Rend S deer ea wa eT HT
(ii) Beg hee Rens B door ee wr aT UT
4. (a) Briefly explain the provisions relating to Suspension and Revocation of Digital
Signature Certificate under IT Act, 2000. (9)
() (i) Explain the duties of Certifying Authority under IT Act.
(ii) What do you mean by ‘Cyber Terrorism’ as under IT Act. (2x3=6)
() Grr wae sfoFer, 2000 F siete freer wee wT TAS Pete alte
Preettrer S aaa FY maul ot ata ¥ zat Afra
PTO.1859 4
(@) (i) aerate staan & sieve war sired & adel aA caren wifre!
(i) Garr Rae ofA Sila A et areM BS oan sit “AEA
suena’ & ear aa eI
OR
(a) Define the following terms as per IT Act. 2000: (3x3=9)
() Computer network
(ii) Intermediary
(iil) Certifying Authority
(b) What do you mean by intellectual property? Briefly discuss the various types
of intellectual property. (6)
(%) eu sete sR, 2000S seq PrafSteret we a afer