Computer Science
Related Questions
Write the differences between Proprietary and Free and Open-source software.
Cite examples depicting that you were a victim of following cyber crime. Also, cite provisions in IT Act to deal with such a cyber crime.
(a) Identity theft
(b) Credit card account theft
Ravi received a mail from IRS department. On clicking "Click here", he was taken to an official-looking website, like IRS.gov. He uploaded some important information on it. Identify and explain the cyber crime discussed in this scenario.
Shreya was not able to attend a class and she called up Rajni enquiring about the topic discussed in the class. Rajni informed her that tuples in Python was discussed. She also downloaded a PowerPoint Presentation from the internet and mailed it to Shreya after changing the name to "made by Rajni" saying she had made this presentation for her. Identify and explain the cyber crime being discussed in the above example.