App Logo

No.1 PSC Learning App

1M+ Downloads
Section 66 F of IT act deals with :

ACyber terrorism

BPhishing

CHacking

DViolation of privacy

Answer:

A. Cyber terrorism

Read Explanation:

65 - Tampering with computer source documents 66 - 0Hacking with computer system 66B - Receiving stolen computer or communication device 66C - Using password of another person 66D - Cheating using computer resource 66E - Publishing private images of others 66F - Acts of cyberterrorism 67 - Publishing information which is obscene in electronic form.


Related Questions:

കമ്പ്യൂട്ടർ വൈറസുകളെ കണ്ടെത്താനും അവയെ തടയാനും നശിപ്പിക്കാനും ഉപയോഗിക്കുന്ന സോഫ്റ്റ്‌വെയറുകൾ എന്ത് പേരിൽ അറിയപ്പെടുന്നു?
………. Is a computer connected to the internet that has been compromised by a hacker, computer virus or Trojan horse and can be used to perform malicious tasks of one sort of another under remote direction.
_______ are a bundle of exclusive rights over creations of the mind, both artistic and commercial:
Which among the following is a malware:
______ is not a web browser .