0% found this document useful (0 votes)
389 views

Assignment Questions

Uploaded by

Dhananjay Singh
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
389 views

Assignment Questions

Uploaded by

Dhananjay Singh
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

Sl.

Questions BTL Course


No. (Select Questions from University question Bank and mention level Outcome
year in bracket or you may give own standard question with (new) (Please (Please
in bracket) mention mention
L1 or L2 CO1 or
or etc...) CO2
etc…)
Unit - I
1. L-1 CO 1
List the types of cyber threats and Explain.
2. Explain who are called as computer criminals. L-2 CO 1
3. Describe Information security and cyber security. L-2 CO 1
4. Illustrate how criminals plan the attacks? L-3 CO 1
5. Explain briefly about Computer sabotage and Software piracy. L-2 CO 1
Unit – II
1. Explain proliferation of mobile devices. L-2 CO 2
2. List the vulnerabilities of mobile. L-1 CO 2
3. Explain about Mobile Viruses? L-2 CO 2
4. Demonstrate the security challenges posed by mobile devices? L-3 CO 2
5. Illustrate the Authentication service security in mobile computing? L-3 CO 2
Unit – III
1. List the offences included in IT Act 2000. L-1 CO 3
2. Illustrate the methods of dealing with Spam. L-3 CO 3
Illustrate the challenges to Indian law and cyber crime scenario in
3 L-3 CO 3
India?
4 Describe anti-spam laws in Canada. L-2 CO 3
5 Briefly explain section 65 and 66 of ITA 2000 in detail. L-4 CO 3
Unit – IV
1. Define copyright and patent. L-1 CO 4
2. Describe Trademark and Trade Name. L-2 CO 4
3 Explain about the Intellectual property in cyberspace? L-2 CO 4
Illustrate the precautive measures to be taken during social media
4 L-3 CO 4
marketing?
5 Demonstrate the ethical dimension of cyber crime? L-3 CO 4
Unit - V
1 List the basic types of financial fraud in businesses? L-1 CO 5
2 Define Confidentiality and privacy. L-1 CO 5
Illustrate the case study of “official website of Maharashtra
3 L-3 CO 5
Government Hacked”?
4 Illustrate the case study of “Parliament Attack”? L-3 CO 5
5 Illustrate the mini-case of “Pune City Police bust Nigerian Racket? L-3 CO 5

You might also like