हिंदी

Cite examples depicting that you were a victim of the following cybercrime. Also, cite provisions in IT Act to deal with such a cybercrime. Credit card account theft - Computer Science (Python)

Advertisements
Advertisements

प्रश्न

Cite examples depicting that you were a victim of the following cybercrime. Also, cite provisions in IT Act to deal with such a cybercrime.

Credit card account theft

एक पंक्ति में उत्तर
Advertisements

उत्तर

Credit card theft is also a type of identity theft. It occurs when someone accesses your credit card account and uses it to make unauthorized purchases.

shaalaa.com
  क्या इस प्रश्न या उत्तर में कोई त्रुटि है?
अध्याय 11: Societal Impact - Exercise [पृष्ठ २५०]

APPEARS IN

एनसीईआरटी Computer Science [English] Class 11
अध्याय 11 Societal Impact
Exercise | Q 19. b) | पृष्ठ २५०

संबंधित प्रश्न

Ms Raveena Sen is an IT expert and a freelancer. She recently used her skills to access the Admin password for the network server of Super Dooper Technology Ltd. and provided confidential data of the organization to its CEO, informing him about the vulnerability of their network security. Out of the following options (i) to (iv), which one most appropriately defines Ms Sen?

Justify the reason for your chosen option :
1) Hacker

2) Cracker

3) Operator

4) Network Admin


Out of the following, which all comes under cyber crime ?

1) Stealing away a brand new hard disk from a showroom

2) Getting in someone's social networking account without his consent and posting on his behalf

3) Secretly copying data from server of an organization and selling it to the other organization.

4) Looking at online activities of a friends blog.


Identify the type of cybercrime for the following situations: A person complains that his/her debit/credit card is safe with him still somebody has done a shopping/ATM transaction on this card.


The primary law in India dealing with cybercrime and electronic commerce is ______


______ is a term used to describe the legal issues related to using of communications technology, particularly "cyberspace", i.e. the Internet.


The school offers a wireless facility (wifi) to the Computer Science students of Class XI. For communication, the network security staff of the school has a registered URL schoolwifi.edu. On 17 September 2017, the following email was mass distributed to all the Computer Science students of Class XI. The email claimed that the password of the students was about to expire. Instructions were given to go to the URL to renew their password within 24 hours.

Do you find any discrepancy in this email?


How would you recognize if one of your friends is being cyberbullied?

Cite the online activities which would help you detect that your friend is being cyberbullied.


Write the difference between the following -

Non-ethical hacking and Ethical hacking


List down the steps you need to take in order to ensure -

your computer is in good working condition for a longer time.


Which of the following is not a type of cybercrime?


Share
Notifications

Englishहिंदीमराठी


      Forgot password?
Use app×