Set A: IT Act Sections with their Offenses
Column I (Section) Column II (Offense)
1. Section 65 A. Publishing obscene information in electronic form.
2. Section 66 B. Hacking with malicious intent.
3. Section 66C C. Tampering with computer source documents.
4. Section 66D D. Identity theft.
5. Section 67 E. Cheating by personation using computer resource.
Set A: Answer
Section 65 → C. Tampering with computer source documents.
Section 66 → B. Hacking with malicious intent.
Section 66C → D. Identity theft.
Section 66D → E. Cheating by personation using computer resource.
Section 67 → A. Publishing obscene information in electronic form.
Set B: Cyber Terms with their Definitions
Column I (Term) Column II (Definition)
1. Phishing A. Unauthorized access to a computer system.
2. Spamming B. A program that replicates itself and spreads.
3. Virus C. Fraudulently obtaining sensitive information by pretending to be a trustworthy entity.
4. Hacking D. The gap between those with and without access to technology.
5. Digital Divide E. Sending unsolicited bulk messages.
Set B: Answer
Phishing → C. Fraudulently obtaining sensitive information by pretending to be a trustworthy entity.
Spamming → E. Sending unsolicited bulk messages.
Virus → B. A program that replicates itself and spreads.
Hacking → A. Unauthorized access to a computer system.
Digital Divide → D. The gap between those with and without access to technology.
Set C: Legal Bodies with their Functions
Column I (Body) Column II (Function)
1. Adjudicating Officer A. Issues Digital Signature Certificates.
2. Cyber Appellate Tribunal B. Investigates cyber crimes.
3. Certifying Authority (CA) C. Hears appeals against orders of the Adjudicating Officer.
4. Cyber Crime Cell D. Determines compensation and penalties for contraventions of the IT Act.
5. Controller of Certifying Authorities (CCA) E. Supervises and licenses Certifying Authorities.
Set C: Answer
Adjudicating Officer → D. Determines compensation and penalties for contraventions of the IT Act.
Cyber Appellate Tribunal → C. Hears appeals against orders of the Adjudicating Officer.
Certifying Authority (CA) → A. Issues Digital Signature Certificates.
Cyber Crime Cell → B. Investigates cyber crimes.
Controller of Certifying Authorities (CCA) → E. Supervises and licenses Certifying Authorities.
Set D: Key Concepts with their Descriptions
Column I (Concept) Column II (Description)
1. E-Commerce A. The application of IT for delivering government services.
2. E-Governance B. A digital code that verifies the authenticity of an electronic document.
3. Digital Signature C. A legally binding agreement formed through electronic means.
4. Electronic Contract D. The buying and selling of goods and services over the internet.
5. Intellectual Property E. Legal rights over creations of the mind, like software and music.
Set D: Answer
E-Commerce → D. The buying and selling of goods and services over the internet.
E-Governance → A. The application of IT for delivering government services.
Digital Signature → B. A digital code that verifies the authenticity of an electronic document.
Electronic Contract → C. A legally binding agreement formed through electronic means.
Intellectual Property → E. Legal rights over creations of the mind, like software and music.
Set E: Preventive Measures with their Purposes
Column I (Measure) Column II (Purpose)
1. Antivirus Software A. To create a barrier between a trusted internal network and untrusted external networks.
2. Firewall B. To protect against unauthorized access by verifying identity.
3. Strong Password C. To prevent, detect, and remove malicious software.
4. Two-Factor Authentication D. To provide an additional layer of security beyond a password.
5. Regular Software Updates E. To patch security vulnerabilities in programs.
Set E: Answer
Antivirus Software → C. To prevent, detect, and remove malicious software.
Firewall → A. To create a barrier between a trusted internal network and untrusted external networks.
Strong Password → B. To protect against unauthorized access by verifying identity.
Two-Factor Authentication → D. To provide an additional layer of security beyond a password.
Regular Software Updates → E. To patch security vulnerabilities in programs.