Cyl 104

Download as pdf or txt
Download as pdf or txt
You are on page 1of 4

C758

Total Pages : 4 Roll No. ......................

CYL-104
Cyber Crimes and Consumer Protection in Cyberspace
(lkbcj vijk/ ,oa miHkksDrk laj{k.k eas lkbcj Lisl)
P.G. Diploma in Cyber Law (PGDCL)
First Year Examination, 2022 (June)

Time : 2 Hours] Max. Marks : 80

Note : This paper is of Eighty (80) marks divided into two


(02) Sections A and B. Attempt the questions contained
in these sections according to the detailed instructions
given therein.
uksV % ;g iz'ui=k vLlh (80) vadksa dk gS tks nks (02)
[k°Mksa d rFkk [k esa foHkkftr gSA izR;sd [k°M esa fn,
x, foLr`r funsZ'kksa ds vuqlkj gh iz'uksa dks gy djuk
gSA

SECTION–A/([k.M&d)
(Long Answer Type Questions)/(nh?kZ mÙkjksa okys iz'u)

Note : Section 'A' contains Five (05) long answer type


questions of Twenty (20) marks each. Learners are
required to answer any Two (02) questions only.
(2×20=40)
C758 / CYL-104 [P.T.O.
uksV % [k°M ^d* esa ik¡p (05) nh?kZ mÙkjksa okys iz'u fn;s x;s
gSa] izR;sd iz'u ds fy, chl (20) vad fu/kZfjr gSaA
f'k{kkfFkZ;ksa dks buesa ls dsoy nks (02) iz'uksa ds mÙkj
nsus gSaA

1. Write an explanatory note on the causes and effects of


Cybercrime. Also discuss the preventive measures to combat
cybercrimes.

lkbcj vijk/ ds dkj.kksa vkSj izHkkoksa ij ,d O;k[;kRed


fVIi.kh fyf[k,A lkbcj vijk/ksa ls fuiVus ds fy, fuokjd
mik;ksa ij Hkh ppkZ djsaA

2. Discuss various types of cyber-attacks with the help of


relevant examples.

izklafxd mnkgj.kksa dh lgk;rk ls fofHkUu izdkj ds lkbcj


geyksa dh ppkZ dhft,A

3. What is computing? Explain the different types of


Computing.

daI;wfVax D;k gS\ daI;wfVax ds fofHkUu izdkjksa dh O;k[;k djsaA

4. Describe the reason for hacking is made a crime punishable


under the Information Technology (IT) Act, 2000.

lwpuk izk|S ksfxdh (vkbZVh) vf/fu;e] 2000 ds rgr gSfdax dks


naMuh; vijk/ cukus ds dkj.kksa dk o.kZu djsaA
C758 / CYL-104 [2]
5. What are the various specific remedies available under
Specific Relief Act, 1963?

fof'k"V vuqrks"k vf/fu;e] 1963 ds rgr miyC/ fofHkUu


fof'k"V mipkj D;k gSa\

SECTION–B/([k.M&[k)
(Short Answer Type Questions)/(y?kq mÙkjksa okys iz'u)

Note : Section 'B' contains Eight (08) short answer type


questions of Ten (10) marks each. Learners are required
to answer any Four (04) questions only. (4×10=40)
uksV % [k°M ^[k* esa vkB (08) y?kq mÙkjksa okys iz'u fn;s
x;s gSa] izR;sd iz'u ds fy, nl (10) vad fu/kZfjr
gSaA f'k{kkfFkZ;ksa dks buesa ls dsoy pkj (04) iz'uksa ds
mÙkj nsus gSaA

1. Define Consumer and goods.

miHkksDrk vkSj oLrqvksa dks ifjHkkf"kr dhft,A

2. What are the essentials of declaratory suits?

?kks"k.kkRed oknksa ds vko';d rRo D;k gSa\

3. Difference between sale and agreement to sale.

foØ; vkSj foØ; ds djkj ds chp varj djsaA

C758 / CYL-104 [3] [P.T.O.


4. Discuss position of free speech in different countries.

fofHkUu ns'kksa esa vfHkO;fDr dh Lora=krk dh fLFkfr ij ppkZ djsaA

5. Discuss the landmark case in which Section 66-A of the


Information Technology Act 2000 was struck down.

ml ,sfrgkfld ekeys dh ppkZ dhft, ftlesa lwpuk izk|S ksfxdh


vf/fu;e] 2000 dh /kjk 66&, dks lekIr dj fn;k x;k FkkA

6. What are the various causes or factors affecting the Internet


Governance?

baVjusV 'kklu dks izHkkfor djus okys fofHkUu dkj.k ;k dkjd


D;k gSa\

7. What do you understand by breach of lawful contract under


the IT Act?

vkbZVh vf/fu;e ds rgr oS/ vuqca/ ds mYya?ku ls vki D;k


le>rs gSa\

8. Give a brief account of essential ingredients of the offence


of stalking.

LVkfdax ds vijk/ ds vko';d rRoksa dk laf{kIr fooj.k nsaA

C758 / CYL-104 [4]

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy