Introduction Sending offensive messages through communication services is a form of online harassment or cyberbullying. It involves us...
Showing posts with label IT Act. Show all posts
Showing posts with label IT Act. Show all posts
Hacking with computer systems , Data Alteration (Section 66 of Information Technology Act 2000)
Introduction Hacking with the intent to alter data on computer systems is a serious and unlawful activity. It involves unauthorized acc...
Tampering with computer source Documents (Sec.65 of Infirmation Technology Act 2000)
Introduction - Tampering with computer source documents refers to the act of intentionally altering or modifying the original sourc...
Cyber Law MCQ - 3 (Multiple Choice Questions with Answers)
1. According to the IT Act, 2008 is a person who sends, generates, stores or transmits any electronic message to be sent, generated, stored...
Cyber Law MCQ - 2 (Multiple Choice Questions with answer)
1. Cognizable offenses as described as___________ A. It is the offense in which a police officer can arrest the convict without a warrant. B...
Subscribe to:
Posts (Atom)
See Also..
-
1) Consider the following statements : A) Every promise is an agreement. B) Every agreement is a contract. C) A contrac...
-
1) Which one of the following element is not necessary for a contract ? A) Competent parties B) Reasonable terms and condition...
-
1) Give correct answer : A) Void agreements are always illegal. B) Illegal agreements are always voidable . C) Illegal a...
-
Computer is an important part of an accounting system. Computerized accounting systems are important to business in various...
-
Advantages of Law - There are many Advantages of law... some of the them are as follows : 1) Uniformity and Certainty: ...