Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2
Sl.
Questions BTL Course
No. (Select Questions from University question Bank and mention level Outcome year in bracket or you may give own standard question with (new) (Please (Please in bracket) mention mention L1 or L2 CO1 or or etc...) CO2 etc…) Unit - I 1. L-1 CO 1 List the types of cyber threats and Explain. 2. Explain who are called as computer criminals. L-2 CO 1 3. Describe Information security and cyber security. L-2 CO 1 4. Illustrate how criminals plan the attacks? L-3 CO 1 5. Explain briefly about Computer sabotage and Software piracy. L-2 CO 1 Unit – II 1. Explain proliferation of mobile devices. L-2 CO 2 2. List the vulnerabilities of mobile. L-1 CO 2 3. Explain about Mobile Viruses? L-2 CO 2 4. Demonstrate the security challenges posed by mobile devices? L-3 CO 2 5. Illustrate the Authentication service security in mobile computing? L-3 CO 2 Unit – III 1. List the offences included in IT Act 2000. L-1 CO 3 2. Illustrate the methods of dealing with Spam. L-3 CO 3 Illustrate the challenges to Indian law and cyber crime scenario in 3 L-3 CO 3 India? 4 Describe anti-spam laws in Canada. L-2 CO 3 5 Briefly explain section 65 and 66 of ITA 2000 in detail. L-4 CO 3 Unit – IV 1. Define copyright and patent. L-1 CO 4 2. Describe Trademark and Trade Name. L-2 CO 4 3 Explain about the Intellectual property in cyberspace? L-2 CO 4 Illustrate the precautive measures to be taken during social media 4 L-3 CO 4 marketing? 5 Demonstrate the ethical dimension of cyber crime? L-3 CO 4 Unit - V 1 List the basic types of financial fraud in businesses? L-1 CO 5 2 Define Confidentiality and privacy. L-1 CO 5 Illustrate the case study of “official website of Maharashtra 3 L-3 CO 5 Government Hacked”? 4 Illustrate the case study of “Parliament Attack”? L-3 CO 5 5 Illustrate the mini-case of “Pune City Police bust Nigerian Racket? L-3 CO 5