1)
What
is cyber law?
Ans: The law which governs the legal issues in the cyber space regarding the internet or WWW for digital data processing and transaction is called cyber law.
Ans: The law which governs the legal issues in the cyber space regarding the internet or WWW for digital data processing and transaction is called cyber law.
2)
Write
down the importance of cyber law.
Ans: The importance of cyber law is that it controls cyber-crime and misuse of computer. It also touches almost all aspects of transaction and activities on the cyber space.
Ans: The importance of cyber law is that it controls cyber-crime and misuse of computer. It also touches almost all aspects of transaction and activities on the cyber space.
3)
What
is cyber space?
Ans: A virtual space created by computer network, internet and telecommunication is called cyber space.
Ans: A virtual space created by computer network, internet and telecommunication is called cyber space.
4)
What
are the major laws included in cyber law?
Ans: The major laws included in cyber law are:
i) Electronic and Digital Signature law
ii) Computer crime / Cyber crime law
iii) Intellectual property law
iv) Data protection and privacy law
v) Telecommunication law
Ans: The major laws included in cyber law are:
i) Electronic and Digital Signature law
ii) Computer crime / Cyber crime law
iii) Intellectual property law
iv) Data protection and privacy law
v) Telecommunication law
5)
Why
is cyber law needed?
Ans: Cyber law is needed to legalize the transaction through electronic media to control various types of electronic frauds and to punish a person who does criminal activities through electronic means especially on computers.
Ans: Cyber law is needed to legalize the transaction through electronic media to control various types of electronic frauds and to punish a person who does criminal activities through electronic means especially on computers.
6) What is cyber-crime?
Ans: Cyber-crime is an illegal actions involved in any computer, computer system or over all computer network like the internet.
Ans: Cyber-crime is an illegal actions involved in any computer, computer system or over all computer network like the internet.
The example of computer crime are:
i.
Software piracy
ii.
Hacking
iii.
Cracking
iv.
Pornography
7) What is a digital
signature?
Ans: A digital code (generated and authenticated by public key
encryption) which is attached to an electronically transmitted document to
verify its contents and the sender's identity.
8)
Write
down the importance of digital signature.
Ans: The importance of digital signature is that it provides legal framework to facilitate and safeguard electronic transaction in the electronic media.
Ans: The importance of digital signature is that it provides legal framework to facilitate and safeguard electronic transaction in the electronic media.
9)
What
is computer ethics?
Ans: Computer ethics refers to a kind of international law that gives awareness to the user regarding the immoral behaviour and activities in the computing field.
Ans: Computer ethics refers to a kind of international law that gives awareness to the user regarding the immoral behaviour and activities in the computing field.
Computer
ethics refers to follow the rules and regulation of computer technology and not
to harm other computer users knowingly or unknowingly.
10) Define encryption and
decryption.
Ans: The process of encoding (scrambling) information in such a way that it is unreadable to all is called encryption.
The process of restoring encrypted data to its original form is called decryption.
Ans: The process of encoding (scrambling) information in such a way that it is unreadable to all is called encryption.
The process of restoring encrypted data to its original form is called decryption.
11) What is hacking?
Ans: Computer hacking means stealing and destroying other data, information, files and program.
Ans: Computer hacking means stealing and destroying other data, information, files and program.
12) List some commandments
of computer ethics.
Ans: Some important commandments of computer ethics are:
i) You should not use computer to harm other people.
ii) You should not search the files or records of other people.
iii) You should not destroy, steal and use others computer password of other people.
iv) You should not steal, destroy, erase or edit personal or group records.
v) You should not disclose the secrecy of computer.
Ans: Some important commandments of computer ethics are:
i) You should not use computer to harm other people.
ii) You should not search the files or records of other people.
iii) You should not destroy, steal and use others computer password of other people.
iv) You should not steal, destroy, erase or edit personal or group records.
v) You should not disclose the secrecy of computer.
13)
What
are the major issues address by cyber law?
Ans: The major issues addressed by cyber
law are:
i.
Criminal activities on
cyberspace.
ii.
Electronic commerce, online
transactions and digital signature.
iii.
Intellectual property
right, copyright violation
iv.
The provision of
e-governance by promoting electronic recording system
14)
What
is salami saving? Explain
Ans: When a programmer alters a program
so that it subtracts a very small amount of money from each account and alters
the fund to the embezzler’s account is called salami saving.
15)
What
are intellectual property rights?
Ans: The legal property rights of
someone over his creations of the mind both artistic and commercial are called
intellectual property rights.
16)
Explain
in short data security and privacy law.
Ans: Data protection and privacy refers
to the process of ensuring the preservation, integrity and reliability of data.
The law related to it is called data
security and privacy law.
17)
State
any five major aspects of cyber law of Nepal 2004.
Ans: Five major aspects of cyber law of
Nepal 2004 are:
i)
Provides legal status
for various banking transaction through electronic media, which will be
instrumental in boosting economic activities throughout the world via internet.
ii)
Provides a legal
framework to facilitate and safeguard electronic transactions in electronic
medium.
iii)
Provides a detailed
provision for the controller of certifying authorities to regulate certifying
authorities.
iv)
Provides punishment who
conducts cyber crime.
v)
Provisions under the
act in order to control and regulate the criminal activities apparent in Nepal
cyber environment.
Which is the latest ICT policy?
ReplyDelete