
Information Technology Act, 2000
1. What is the main purpose of the Information Technology Act, 2000?
a. To regulate internet service providers
b. To provide legal recognition for electronic transactions and amend certain laws for electronic commerce
c. To replace the BNS entirely
d. To establish a cyber police force
2. Which of the following laws were amended by the IT Act, 2000?
a. BNS,2023
b. BSA,2023
c. Banker’s Books Evidence Act, 1891
d. Reserve Bank of India Act, 1934
e. All of the above
3. The IT Act, 2000 extends to—
a. Only the territory of Delhi
b. Only Indian citizens
c. The whole of India
d. Only online transactions
4. Can the IT Act, 2000 apply to offences committed outside India?
a. No, it is strictly domestic
b. Yes, if committed by any person and as provided in the Act
c. Only if committed by an Indian citizen
d. Only with UN approval
5. Does the IT Act, 2000 apply to all documents and transactions without exception?
a. Yes, to all electronic and paper-based documents
b. No, it does not apply to documents or transactions specified in the First Schedule
c. Only applies to digital signatures
d. Only applies to government documents
6. Who can amend the First Schedule under Section 1(4) of the IT Act?
a. The Parliament only
b. The President of India
c. The Central Government by notification in the Official Gazette
d. The Supreme Court of India
7. The IT Act, 2000 was influenced by which international model law?
a. UNCITRAL Model Law on Electronic Commerce
b. OECD Guidelines on E-Commerce
c. EU Data Protection Directive
d. UN Convention on Cybercrime
8. The IT Act, 2000 facilitates—
a. Online gambling regulation
b. Electronic filing of documents with government agencies
c. Regulation of telecommunication tariffs
d. Only international trade
9. The Act comes into force:
a. 9th October, 2000
b. On 15th August, 2000
c. 17th October, 2000
d. 9th June, 2000
10. The Act provides legal recognition for transactions carried out by—
a. Paper-based documents only
b. Electronic data interchange and other electronic communication
c. Postal mail only
d. Telephonic transactions
11. What does “access” mean under the IT Act, 2000?
a. Physically entering a room with a computer
b. Gaining entry into, instructing, or communicating with the logical, arithmetical, or memory function resources of a computer, computer system, or computer network
c. Only viewing files on a computer
d. Sending an email
12. Who is considered an “addressee”?
a. Any person who reads an email
b. The network provider delivering the electronic record
c. A person intended by the originator to receive the electronic record, excluding any intermediary
d. Any random internet user
13. Who is an “adjudicating officer”?
a. Any government official
b. Officer appointed under sub-section (1) of section 46 to adjudicate contraventions under the IT Act
c. A police officer
d. Any employee of a company
14. What is meant by “affixing electronic signature”?
a. Signing a paper document with ink
b. Typing one’s name in an email
c. Adoption of any methodology or procedure for authenticating an electronic record by means of electronic signature
d. Sending a scanned signature
15. Who is the “appropriate Government” for a matter in the State List (List II)?
a. Central Government
b. State Government
c. Local Municipality
d. Supreme Court
16. Who is the “appropriate Government” for matters not listed in State or Concurrent Lists?
a. Local authorities
b. Central Government
c. State Government
d. Judiciary
17. What is an “asymmetric crypto system”?
a. A system using the same key for encryption and decryption
b. A system of a secure key pair consisting of a private key for creating a digital signature and a public key to verify the digital signature
c. A system using passwords for access
d. Any software for encryption
18. Who is a “Certifying Authority”?
a. Any IT company
b. Person granted a licence to issue an electronic signature certificate under section 24
c. A government judge
d. The Central Government
19. What is a “certification practice statement”?
a. A contract between employer and employee A statement issued by a Certifying Authority specifying the practices it employs in issuing electronic signature certificates
b. A contract between employer and employee
c. Any IT policy document
d. Guidelines issued by the Supreme Court
20. What is a “computer network”?
a. Any single computer connected to the internet
b. Interconnection of one or more computers or communication devices using satellite, microwave, terrestrial line, wire, wireless, or other communication media, whether continuously maintained or not
c. A computer in a cyber cafe
d. Only government servers
21. What does “computer resource” include?
a. Only computers
b. Only software
c. Computer, computer system, computer network, data, computer database, or software
d. Only internet connections
22. What is a “computer system”?
a. Any standalone computer
b. Device or collection of devices, including input and output support devices (excluding non-programmable calculators), which contain programs, instructions, input/output data, and perform logic, arithmetic, storage, retrieval, and communication functions
c. Only servers in an office
d. Any device with internet access
23. Who is the “Controller” under the IT Act?
a. Any IT officer
b. Head of a cyber cafe
c. Controller of Certifying Authorities appointed under sub-section (1) of section 17
d. Internet service provider
24. What does “cyber security” mean under the IT Act, 2000?
a. Protecting information from loss due to software bugs
b. Protecting information, equipment, devices, computer, computer resource, communication device, and information stored therein from unauthorized access, use, disclosure, disruption, modification, or destruction
c. Only antivirus protection
d. Creating backups of all data
25. What is a “digital signature”?
a. Authentication of any electronic record by a subscriber by means of an electronic method or procedure in accordance with the provisions of section 3
b. A scanned signature image
c. A typed name in email
d. Any electronic key
26. What is a “Digital Signature Certificate”?
a. Certificate issued by a bank
b. Digital Signature Certificate issued under sub-section (4) of section 35
c. Any scanned signature certificate
d. A certificate for software usage
27. What does “electronic form” mean?
a. Any information on paper scanned to PDF
b. Only computer files
c. Only emails
d. Any information generated, sent, received, or stored in media like magnetic, optical, computer memory, microfilm, or computer-generated microfiche
28. What is an “electronic signature”?
a. Handwritten signature scanned
b. Authentication of any electronic record by a subscriber by means of the electronic technique specified in the Second Schedule, including digital signature
c. Any digital text
d. Computer password
29. What is the Indian Computer Emergency Response Team (CERT-IN)?
a. IT service provider
b. An agency established under sub-section (1) of Section 70B
c. Internet service provider
d. Government software vendor
30. Who is an “intermediary”?
a. Person who owns a computer Person who, on behalf of another, receives, stores, or transmits electronic records or provides any related service, including ISPs, telecom providers, web-hosting, search engines, online marketplaces, and cyber cafes
b. Person who owns a computer
c. Only internet service providers
d. Only government servers
31. What is a “key pair” in an asymmetric crypto system?
a. Two unrelated keys
b. Any two random keys
c. Only a password and PIN
d. Any two random keys A private key and its mathematically related public key where the public key can verify a digital signature created by the private key
32. What does “law” include under the IT Act, 2000?
a. Only statutes passed by Parliament
b. Any Act of Parliament or State Legislature, Ordinances, Regulations made by President under Article 240, Bills enacted as President’s Act, and rules, regulations, bye-laws, and orders issued thereunder
c. Only rules and regulations
d. Only judicial decisions
33. Who is an “originator”?
a. Any recipient of an email
b. Any ISP
c. Any computer network
d. Any ISP Person who sends, generates, stores, or transmits any electronic message or causes it to be sent, generated, stored, or transmitted, excluding intermediaries
34. What does “private key” mean?
a. Key to open a computer
b. Key of a key pair used to create a digital signature
c. Any password
d. Public key of a subscriber
35. What does “public key” mean?
a. Key to encrypt files
b. Any computer password
c. Key of a key pair used to verify a digital signature and listed in the Digital Signature Certificate
d. The private key of a subscriber
36. What is a “secure system”?
a. Any computer with antivirus
b. Computer hardware, software, and procedures that are reasonably secure from unauthorized access, provide reliability, perform intended functions, and follow generally accepted security procedures
c. Only government computers
d. Any server connected to internet
37. Security procedure is prescribed by:
a. State Government
b. Supreme Court
c. Central Government
d. Certifying Authority
38. Who is a “subscriber”?
a. Any internet user
b. Person in whose name an electronic signature certificate is issued
c. Owner of a website
d. Internet service provider
39. What does “verify” mean in relation to a digital signature?
a. Determine whether the electronic record was affixed with the digital signature using the private key corresponding to the subscriber’s public key, and whether the record is intact or altered
b. Open the file in a computer
c. Check the email ID of sender
d. Only check the certificate expiry date
40. Who may authenticate an electronic record under Section 3 of the IT Act, 2000?
a. Any government officer
b. Any third-party intermediary
c. Only the recipient of the record
d. Any subscriber by affixing his digital signature
41. What is required for authentication of an electronic record according to Section 3(2)?
a. Use of asymmetric crypto system and hash function which envelop and transform the initial electronic record into another electronic record
b. Only encryption
c. Manual signature scanning
d. Sending a PDF copy of the record
42. What is a “hash function” as explained in Section 3?
a. A function to compress files
b. A method to encrypt text files
c. A method to encrypt text files An algorithm mapping or translation of one sequence of bits into another, generally smaller, set known as “hash result” such that the same electronic record yields the same hash result every time
d. A technique for sending emails securely
43. How can anyone verify an electronic record according to Section 3(3)?
a. By contacting the sender
b. By using the public key of the subscriber
c. By checking the PDF format
d. By reading the record on a secure computer
44. What is the relationship between the private key and public key under Section 3(4)?
a. They are the same key
b. They are unrelated keys
c. They are unique to the subscriber and constitute a functioning key pair
d. Only the private key is important
45. What does the asymmetric crypto system ensure in digital signatures?
a. That records can be read by anyone
b. That the electronic record is transformed securely and can be verified using a public key
c. Only compresses data
d. Only changes file format
46. Who may authenticate an electronic record under Section 3A of the IT Act, 2000?
a. A subscriber by such electronic signature or electronic authentication technique which is considered reliable and may be specified in the Second Schedule
b. Any government officer
c. Only the recipient of the record
d. Any intermediary
47. According to Section 3A, how is control over signature creation data or authentication data defined?
a. It can be shared with multiple people
b. It must be under the control of the signatory or authenticator and no other person at the time of signing
c. It may be controlled by any third party
d. It can be stored in public servers
48. Which condition ensures detectability of alteration in an electronic signature under Section 3A?
a. Signature cannot be encrypted
b. Only government can detect changes
c. Any alteration to the electronic signature made after affixing it is detectable
d. Alterations are always allowed
49. Who can prescribe additional conditions for reliability of electronic signature?
a. The Supreme Court
b. Any private company
c. Any subscriber
d. The Central Government
50. What power does the Central Government have under Section 3A(3)?
a. To prescribe the procedure to ascertain whether the electronic signature is that of the person by whom it is purported to have been affixed
b. To issue fines for unreliable electronic signatures
c. To create digital signatures for subscribers
d. To store electronic records
51. Section 3A overrides which section regarding authentication of electronic records?
a. Section 2
b. Section 3
c. Section 4
d. Section 5
52. Which Schedule specifies the electronic signatures or authentication techniques under Section 3A?
a. First Schedule
b. Third Schedule
c. Second Schedule
d. Fourth Schedule
53. Under Section 4, when is an electronic record deemed to satisfy a legal requirement of being “in writing”?
a. Only if printed and signed manually
b. If it is rendered or made available in electronic form and is accessible so as to be usable for a subsequent reference
c. If it is sent by email only
d. If it is stored on a mobile phone
54. Can electronic records replace the requirement of “in writing” under any law according to Section 4?
a. Yes, notwithstanding anything contained in such law
b. No, traditional written documents are always required
c. Only for financial transactions
d. Only if approved by court
55. What are the two essential conditions for legal recognition of electronic records under Section 4?
a. Rendered in electronic form and digitally signed
b. Rendered in electronic form and accessible for subsequent reference
c. Printed and mailed
d. Stored offline and encrypted
56. Can Section 4 be applied to documents stored on a cloud server?
a. Yes, as long as they are accessible for subsequent reference
b. No, only local storage is allowed
c. Only government servers
d. Only encrypted servers
57. Which of the following is NOT a requirement under Section 4 for legal recognition of electronic records?
a. Rendered in electronic form
b. Accessible for subsequent reference
c. Digitally signed
d. Complies with the law requiring writing
58. What does Section 5 of the IT Act, 2000 provide?
a. Legal recognition of electronic signatures in place of handwritten signatures
b. Legal recognition of electronic records
c. Requirement to maintain paper records
d. Restriction on digital signatures
59. When is an electronic signature deemed to satisfy the legal requirement of a signature under Section 5?
a. Only if scanned and printed
b. Only if digitally signed with a private key
c. Only for government documents
d. Only if digitally signed with a private key If it is authenticated by means of electronic signature affixed in the manner prescribed by the Central Government
60. Which of the following is covered under Section 5 for legal recognition?
a. Only documents signed physically
b. Any information or matter that requires authentication or signing under law
c. Only electronic records transmitted by email
d. Only contracts with banks
61. Section 5 provides legal recognition to electronic signatures for which type of information?
a. Any information or matter that law requires to be signed
b. Only government orders
c. Only financial transactions
d. Only contracts over a certain amount
62. According to Section 5, a mark on a document is treated as:
a. Not valid
b. Valid as a signature
c. Only valid if digital
d. Only valid for government documents
63. What does Section 6 of the IT Act, 2000 provide?
a. Legal recognition of electronic signatures in private contracts
b. Regulation of digital payment systems
c. Filing of documents only in physical form
d. Regulation of digital payment systems Use of electronic records and electronic signatures in Government and its agencies
64. Under Section 6, when can electronic form be used for filing with Government offices?
a. Only when permitted by the Supreme Court
b. When a law provides for filing of any form, application, or document with a government office, authority, body, or agency
c. Only for financial transactions
d. Only for information technology departments
65. According to Section 6, electronic form can be used for which of the following government processes?
a. Filing forms and applications
b. Issuance of licenses, permits, sanctions, or approvals
c. Receipt or payment of money
d. All of the above
66. What effect does Section 6 have on other laws regarding filing, issuance, or payment?
a. It does not affect any other law
b. It allows electronic means notwithstanding anything contained in any other law
c. It repeals other laws
d. It only applies to laws made after 2000
67. What can the appropriate Government prescribe under Section 6(2)(A.?
a. The amount of fines for late filing The manner and format in which electronic records shall be filed, created, or issued
b. The amount of fines for late filing
c. The penalties for misuse of digital signatures
d. Only the types of forms that can be digitized
68. Section 6 ensures that electronic filing in government offices is:
a. Optional and not legally recognized
b. Only valid for electronic payment
c. Mandatory for all transactions
d. Legally recognized if prescribed by the appropriate Government
69. Who may authorise service providers under Section 6A(1)?
a. The appropriate Government
b. The Supreme Court of India
c. Any private company
d. The Cyber Appellate Tribunal
70. Which of the following entities can be a service provider under Section 6A?
a. Individual
b. Private agency or company
c. Partnership firm or sole proprietor
d. Any body or agency authorised by the appropriate Government
e. All of the above
71. Under Section 6A (2), what powers can the appropriate Government grant to authorised service providers?
a. Only to maintain computerised facilities
b. To collect, retain, and appropriate service charges for providing services
c. To enact laws for electronic governance
d. To punish non-compliant users
72. Who specifies the scale of service charges that may be collected by service providers?
a. The appropriate Government by notification in the Official Gazette
b. The Supreme Court
c. The Central Information Commission
d. The service providers themselves
73. Which section of the IT Act, 2000 allows the appropriate Government to authorise service providers for electronic delivery of public services?
a. Section 3
b. Section 6A
c. Section 4
d. Section 7
74. Which authority can modify the list of authorised service providers or services under Section 6A?
a. Parliament
b. The Supreme Court
c. The appropriate Government
d. The Central Information Commission
75. When can the retention requirement of a law be satisfied under Section 7(1)?
a. Only if physical documents are preserved
b. Only if stored on a private server
c. Only if certified by a government officer
d. If documents, records, or information are retained in electronic form meeting specified conditions
76. Which of the following is a condition under Section 7(1) for retention of electronic records?
a. Information must remain accessible and usable for subsequent reference
b. Electronic record must be retained in its original format or a format representing the information accurately
c. Details facilitating identification of origin, destination, date, and time of dispatch or receipt must be available
d. All of the above
77. Does Section 7 apply to information automatically generated solely to enable dispatch or receipt of an electronic record?
a. Yes, it always applies
b. No, this information is exempted
c. Only if it is encrypted
d. Only if approved by the appropriate Government
78. For retention under Section 7, the electronic record format must be:
a. The format in which it was originally generated, sent, or received, or a format accurately representing it
b. Any random format chosen by the user
c. Only paper printouts
d. Any format approved by the Supreme Court
79. Section 7 requires that the retained electronic record must have details facilitating identification of:
a. The origin and destination of the record
b. The date and time of dispatch or receipt
c. The content creator’s email address
d. Both A and B
80. Section 7(2) states that the section does not apply to:
a. Laws that expressly provide retention in electronic form
b. Laws that mandate retention in physical form
c. Private documents
d. Intermediary services
81. Section 7A of the Information Technology Act, 2000 deals with:
a. Retention of electronic records
b. Audit of documents maintained in electronic form
c. Authentication of electronic records
d. Legal recognition of electronic signatures
82. Section 7A applies when:
a. A law provides for audit of physical records only
b. A law provides for audit of documents, records or information
c. Records are stored outside India
d. Digital signatures are used
83. What is the effect of Section 7A on electronic records?
a. Electronic records are exempted from audit
b. Electronic records require a separate audit law
c. Audit provisions applicable to physical records also apply to electronic records
d. Audit applies only if notified by the Central Government
84. Section 7A comes into operation:
a. Only when notified by the Central Government
b. Automatically as part of the Information Technology Act, 2000
c. Only after framing of rules
d. Only for cyber crimes
85. Section 7A strengthens which principle of the IT Act?
a. Technological neutrality
b. Cyber security
c. Data localisation
d. Intermediary liability
86. Section 8 of the Information Technology Act, 2000 deals with:
a. Authentication of electronic records
b. Publication of rules and notifications in Electronic Gazette
c. Retention of electronic records
d. Audit of electronic records
87. Under Section 8, publication in which Gazette satisfies the legal requirement?
a. Only Official Gazette
b. Only Electronic Gazette
c. Either Official Gazette or Electronic Gazette
d. Website of the Government
88. If a notification is published both in Official Gazette and Electronic Gazette, the date of publication shall be:
a. Date of Electronic Gazette only
b. Date of Official Gazette only
c. Date of Gazette which was first published
d. Date specified in the notification
89. Section 8 primarily promotes:
a. Cyber security
b. E-governance
c. Digital evidence
d. Intermediary liability
90. If a rule is published first in Electronic Gazette and later in Official Gazette, the effective date will be:
a. Date of Official Gazette
b. Date of enforcement
c. Date mentioned in the rule
d. Date of Electronic Gazette
91. Which body publishes the Electronic Gazette for the purpose of Section 8?
a. Any private publisher
b. Government authority
c. Intermediary
d. Certifying Authority
92. Section 8 removes the distinction between:
a. Digital and physical publication for Gazette purposes
b. Online and offline evidence
c. Central and State notifications
d. Temporary and permanent rules
93. Section 9 of the Information Technology Act, 2000 states that Sections 6, 7 and 8:
a. Are mandatory in all cases
b. Confer a legal right to electronic governance
c. Do not confer a right to insist on electronic form
d. Are applicable only to Central Government
94. Under Section 9, a person can insist that documents be accepted in electronic form by:
a. Central Government only
b. State Government only
c. Any Government authority
d. No authority
95. Sections 6, 7 and 8 mainly relate to:
a. Cyber offences
b. Electronic governance and records
c. Intermediary liability
d. Digital signatures only
96. Section 9 restricts the right of a person to:
a. Use electronic records
b. Authenticate electronic records
c. Insist on electronic acceptance by Government
d. Access electronic information
97. Which of the following bodies is covered under Section 9?
a. Only Central Government ministries
b. Only State Government departments
c. Private companies
d. Authorities controlled or funded by Government
98. According to Section 9, electronic form acceptance by Government is:
a. A statutory obligation
b. A fundamental right
c. Discretionary
d. Mandatory under all circumstances
99. Section 9 applies to acceptance, issue, creation, retention and:
a. Preservation of documents
b. Authentication
c. Verification
d. Destruction of records
100. Section 9 ensures that e-governance provisions are:
a. Optional and flexible
b. Penal in nature
c. Retrospective
d. Compulsory
101. Section 9 applies to authorities established:
a. Only by Constitution
b. Only by Parliament
c. By or under any law
d. Only by State Legislature
102. Under Section 10, the Central Government may prescribe the:
a. Validity of electronic contracts
b. Type of electronic signature
c. Penalty for misuse of signature
d. Jurisdiction of courts
103. The manner and format in which electronic signature shall be affixed is prescribed under:
a. Section 3
b. Section 3A
c. Section 10
d. Section 35
104. Section 10 allows the Central Government to prescribe procedures relating to:
a. Electronic governance
b. Authentication of electronic records
c. Identification of electronic signatory
d. Retention of electronic records
105. Control processes and procedures under Section 10 are meant to ensure:
a. Speed and efficiency
b. Integrity, security and confidentiality
c. Accessibility and transparency
d. Cost reduction
106. Section 10 applies to control processes relating to electronic records or:
a. Electronic evidence
b. Electronic contracts
c. Electronic payments
d. Electronic offences
107. Section 10 supports the implementation of which concept?
a. Electronic governance
b. Digital authentication
c. Cyber forensics
d. Online dispute resolution
108. The power under Section 10 is exercised by the Central Government through:
a. Ordinances
b. Administrative instructions
c. Statutory rules
d. Judicial directions
109. The rule-making power under Section 10 is an example of:
a. Judicial power
b. Administrative power
c. Delegated legislation
d. Constitutional power
110. Section 10A of the Information Technology Act, 2000 deals with:
a. Electronic governance
b. Electronic signatures
c. Cyber offences
d. Validity of electronic contracts
111. Section 10A applies when communication of proposals and acceptances is made through:
a. Oral communication
b. Written documents only
c. Electronic form or electronic records
d. Registered post
112. According to Section 10A, a contract shall not be deemed unenforceable solely because:
a. It is unsigned
b. Electronic means were used
c. It is oral
d. It is unstamped
113. Which stage of contract formation is covered under Section 10A?
a. Proposal only
b. Acceptance only
c. Revocation only
d. Proposal, acceptance and revocation
114. The expression “electronic means” under Section 10A relates to:
a. Physical delivery
b. Telegraphic communication
c. Electronic form or electronic records
d. Verbal communication
115. Section 10A removes which legal obstacle in electronic contracts?
a. Capacity of parties
b. Mode of communication
c. Consideration
d. Free consent
116. Section 10A strengthens the legal recognition of:
a. Electronic governance
b. Electronic evidence
c. Electronic commerce
d. Electronic signatures
117. Section 10A is based on the principle that:
a. Written contracts are mandatory
b. Electronic form is inferior
c. Form of communication should not affect validity
d. Only signed contracts are valid
118. Section 10A was inserted to align contract law with:
a. Criminal law
b. Constitutional law
c. Technological advancements
d. Administrative law
119. Section 11 of the Information Technology Act, 2000 deals with:
a. Authentication of electronic records
b. Attribution of electronic records
c. Retention of electronic records
d. Secure electronic records
120. An electronic record shall be attributed to the originator if it is sent by:
a. Any intermediary
b. Any third party
c. The originator himself
d. Any government authority
121. Section 11 recognises attribution of an electronic record sent by:
a. Manual delivery
b. Postal service
c. Information system operating automatically
d. Oral communication
122. Section 11 comes into operation when an electronic record is:
a. Accessed
b. Sent
c. Stored
d. Deleted
123. An electronic record sent without authority can be attributed to the originator under Section 11 only if:
a. It is signed
b. It is encrypted
c. Authority existed
d. Court permits
124. Attribution under Section 11 does NOT depend on:
a. Mode of transmission
b. Authority of sender
c. Programming of system
d. Intention of addressee
125. Section 12 of the Information Technology Act, 2000 deals with:
a. Attribution of electronic records
b. Dispatch of electronic records
c. Acknowledgment of receipt
d. Secure electronic records
126. When the originator has not stipulated the form of acknowledgment, it may be given by:
a. Registered post
b. Court order
c. Any communication by the addressee
d. Only written reply
127. If acknowledgment is not received where it is mandatory, the electronic record is deemed:
a. Delivered
b. Never sent
c. Accepted
d. Dispatched late
128. If no stipulation regarding binding nature exists and acknowledgment is not received:
a. Record becomes void immediately
b. Record is deemed accepted
c. Originator may give notice
d. Addressee is liable
129. If acknowledgment is still not received after notice:
a. Originator must resend
b. Originator may treat it as never sent
c. Record becomes binding
d. Addressee is punished
130. When acknowledgment is not stipulated as binding, failure to receive it allows originator to:
a. Ignore the record
b. Cancel contract immediately
c. Give notice to addressee
d. File complaint
131. Section 13 of the Information Technology Act, 2000 deals with:
a. Attribution of electronic records
b. Acknowledgment of receipt
c. Time and place of despatch and receipt
d. Secure electronic records
132. Despatch of an electronic record occurs when:
a. It is created by the originator
b. It is signed digitally
c. It is acknowledged by the addressee
d. It enters a computer resource outside the control of the originator
133. If the addressee has designated a computer resource, receipt occurs when:
a. Message is sent
b. Message is signed
c. Electronic record enters the designated computer resource
d. Addressee reads the message
134. If an electronic record is sent to a non-designated computer resource of the addressee:
a. Receipt occurs when retrieved by the addressee
b. Receipt occurs on storage
c. Receipt occurs on sending
d. Receipt never occurs
135. If no computer resource is designated by the addressee, receipt occurs when:
a. Record is dispatched
b. Record is signed
c. Record enters computer resource of the addressee
d. Record is acknowledged
136. Time of receipt under Section 13(2) is determined:
a. By court order
b. By intermediary
c. As per statutory rules
d. As provided in the Act
137. Place of receipt of an electronic record is deemed to be:
a. Location of computer resource
b. Place of business of addressee
c. Place of originator
d. Place of Central Government
138. Section 13(4) clarifies that:
a. Location of server decides jurisdiction
b. Physical delivery is mandatory
c. Sub-section (2) applies despite different computer location
d. Place of residence is irrelevant
139. If a person has more than one place of business, the place of business shall be:
a. Any branch office
b. Registered office
c. Principal place of business
d. Place of residence
140. If the originator has no place of business, place of business means:
a. Usual place of residence
b. Place of server
c. Place of dispatch
d. Place of intermediary
141. For a body corporate, usual place of residence means:
a. Place of main office
b. Place of business
c. Place where it is registered
d. Place of operations
142. Section 13 helps in determining:
a. Punishment
b. Liability
c. Time and place for legal purposes
d. Cyber offences
143. If electronic record is retrieved later from non-designated resource, receipt occurs at:
a. Time of sending
b. Time of retrieval
c. Time of storage
d. Time of acknowledgment
144. Section 14 of the Information Technology Act, 2000 deals with:
a. Secure electronic signature
b. Secure electronic record
c. Attribution of electronic record
d. Retention of electronic records
145. An electronic record becomes a secure electronic record when:
a. It is created electronically
b. It is sent through a secure network
c. A security procedure is applied
d. It is acknowledged by addressee
146. The security procedure must be applied at:
a. Any time after receipt
b. A specific point of time
c. At the time of dispute
d. At the time of acknowledgment
147. Once a security procedure is applied, the record remains secure:
a. Permanently
b. Until deletion
c. From that point of time to verification
d. Until acknowledgment
148. Verification under Section 14 refers to:
a. Court verification
b. Government verification
c. Verification of electronic record
d. Manual verification
149. The secure status of an electronic record ends:
a. At the time of verification
b. On receipt
c. On dispatch
d. On acknowledgment
150. A secure electronic record enjoys:
a. Automatic enforcement
b. Higher evidentiary value
c. Penal immunity
d. International recognition