91. The Information Technology Act, 2000 provides that:
92. Hacking with computer system is defined by Information Technology Act in:-
93. A accesses the e-mail of B unauthorisedly by cracking password and further uses B's e-mail to send message to B's uncle pretending that the message is sent by B, requests for depositing thirty thousand rupees in the account number given in the e-mail as his cash has been stolen and he has to urgently deposit the college fees. A commits contravention/offence under which sections of the Information Technology Act, 2000?
94. How many schedules are there in Information Technology Act 2000?
95. The penalty for damage to computer, computer system, etc. as laid down in Section 43 of the Information Technology Act, 2000
96. Which are the grounds which section 80 covers?
97. The Information Technology Amendment Act came into force in;
98. The offences under Section 66B, 66C, 66D and 66E of Information Technology Act, 2000, are:
99. Where a person causes or is likely to cause death or damage to or destruction of property by denying access to any person who is authorized to access computer resource or introducing or causing to introduce any computer contamination, with the intention of threatening integrity or sovereignty of India or to strike terror in India, is punishable under Information Technology Act as
100. Public key under the Information Technology Act, 2000 means . . . . . . . .
Read More Section(Information Technology Act)
Each Section contains maximum 100 MCQs question on Information Technology Act. To get more questions visit other sections.