CHAPTER
10
10
INFORMATION TECHNOLOGY
(AMENDMENT) ACT, 2008
(AMENDMENT) ACT, 2008
Scan
of Past Exam Questions:
of Past Exam Questions:
Year | Marks | Questions | Answers in ICAI-ISCA Study Material Page No: |
N 08 | 5 | 1(c) State the liabilities of companies under section 85 of Information Technology Act, 2000 | 10.53 |
5 | 7(c) Powers of Cyber Appellate Tribunal | 10.36 | |
J 09 | 5 | 6(b) State the duties of the subscriber of a digital signature as specified in Section 40 to 42 of Chapter VIII of Information Technology (Amendment) Act, 2008 | 10.26 |
5 | 6(c) What are the conditions subject to which electronic record may be authenticated by means of affixing digital signature | 10.8 | |
N 09 | 5 | 2(d) How does the Information Technology Act, 2000 enable the authentication of records using digital signatures | 10.8 |
5 | 5(a) How does the Information technology (Amendment) Act, 2008 enable the objective of the Government in spreading e-governance | 10.9-10.11 | |
M 10 | 5 | 4(b) Define following terms related to Information Technology (Amendment) Act, 2008 (i) Computer Contaminant (ii) Cyber Café (iii) Electronic form (iv) Traffic Date (v) Asymmetric Crypto System | 10.5, 10.6 |
N 10 | 5 | 7(d) Write short notes on: Section 41 , ITAA 2008 – Acceptance of Digital Signature Certificate | 10.26 |
N 10 | 4 | 5(a) What does Information Technology (Amendment) Act, 2008 say about (i) Attributes of Electronic Records in Section 11 and (ii) Secure Electronic Signature (Substituted vide ITAA 2008) in section 15 | 10.14, 10.16 |
1 comment:
Out of the above topics, I would love to learn more about the digital signature. How the digital signature has been generated ? What are the benefits as well as limitations of it ? And what are the main purpose of using it ??
Post a Comment