The primary law dealing with cybercrime and electronic commerce in India is the Information Technology Act, 2000.
Answer: 2000
The IT Act, 2000 was amended in the year ________ to address new cyber threats.
Answer: 2008
________ is the act of gaining unauthorized access to a computer system or network.
Answer: Hacking
Sending bulk unwanted emails is known as ________.
Answer: spamming
The act of illegally copying software protected by copyright is called software ________.
Answer: piracy
A ________ is a program that replicates itself and spreads to other computers.
Answer: virus
________ is a type of cyber-attack that tricks users into revealing personal information by pretending to be a trustworthy entity.
Answer: Phishing
The IT Act establishes the office of the ________ to adjudicate cyber disputes.
Answer: Adjudicating Officer
A ________ is a digital signature certificate issued by a Certifying Authority.
Answer: Digital Signature Certificate
The act of deliberately harassing or threatening someone online is called cyber ________.
Answer: stalking
Publishing sexually explicit material in electronic form is a punishable offense under the ________ Act.
Answer: IT
The ________ is the apex body for regulating Cyberspace in India.
Answer: Indian Computer Emergency Response Team (CERT-In)
A contract formed through electronic means like email is known as an ________ contract.
Answer: electronic
The act of stealing another person's online identity to gain benefits is called ________ theft.
Answer: identity
Under the IT Act, ________ are considered legal records.
Answer: electronic records
The punishment for damaging a computer system through the introduction of a virus can lead to imprisonment up to ________ years.
Answer: three
The ________ is responsible for investigating cyber crimes.
Answer: Cyber Crime Cell
The IT Act provides legal recognition to transactions carried out by means of ________ data interchange.
Answer: electronic
A ________ is a secret word or string of characters used for user authentication.
Answer: password
The act of secretly observing someone's computer activity is called ________.
Answer: snooping
The IT Act, 2000 is based on the ________ Model Law on Electronic Commerce.
Answer: United Nations
An ________ is a legal order issued by a court to prevent a person from performing a specific action.
Answer: injunction
The term ________ refers to the gap between those who have access to technology and those who do not.
Answer: digital divide
The ________ Amendment Act, 2008 added Section 66F to define cyber terrorism.
Answer: Information Technology
Violation of the provisions of the IT Act can lead to both ________ and imprisonment.
Answer: fine