Information Technology Act MCQ Quiz in বাংলা - Objective Question with Answer for Information Technology Act - বিনামূল্যে ডাউনলোড করুন [PDF]

Last updated on Mar 9, 2025

পাওয়া Information Technology Act उत्तरे आणि तपशीलवार उपायांसह एकाधिक निवड प्रश्न (MCQ क्विझ). এই বিনামূল্যে ডাউনলোড করুন Information Technology Act MCQ কুইজ পিডিএফ এবং আপনার আসন্ন পরীক্ষার জন্য প্রস্তুত করুন যেমন ব্যাঙ্কিং, এসএসসি, রেলওয়ে, ইউপিএসসি, রাজ্য পিএসসি।

Latest Information Technology Act MCQ Objective Questions

Top Information Technology Act MCQ Objective Questions

Information Technology Act Question 1:

What is the maximum penalty for damage to Computer, Computer systems, unauthorized access, download of data, infecting with virus, denial of access etc as per Section 43?

  1. Rs. 5 lakh
  2. Rs. 70 lakh
  3. Rs. 90 lakh
  4. Rs.1 crore

Answer (Detailed Solution Below)

Option 1 : Rs. 5 lakh

Information Technology Act Question 1 Detailed Solution

The correct answer is Rs. 5 lakh

Key Points 

  • Section 43 of the Information Technology Act, 2000 deals with "Penalty and compensation for damage to computer, computer system, etc."
  • It specifies that any person who, without permission, engages in various activities such as unauthorized access, data download, virus introduction, damage to computer systems, denial of access, and more, shall be liable to pay damages by way of compensation to the person so affected.
  • Section 66. Computer related offences.- If any person, dishonestly or fraudulently, does any act referred to in section 43, he shall be punishable with imprisonment for a term which may extend to three years or with fine which may extend to five lakh rupees or with both.
     
  • The maximum penalty under this section is not exceeding one crore rupees (INR 500,000).
  • The exact amount of compensation will be determined by the court based on the specific circumstances of each case, including the nature and extent of the damage caused.

Here's a summary of the activities covered under Section 43:

  • Unauthorized access or securing access to a computer, computer system, or computer network.
  • Downloading, copying, or extracting data, computer databases, or information from a computer system.
  • Introducing or causing to be introduced any computer contaminant or virus into a computer system.
  • Damaging or causing damage to any computer, computer system, or computer network, data, computer database, or any other programs residing in such systems.

Information Technology Act Question 2:

Government of India passed Information Technology Act in 2000 with objective 

  1. To provide legal sanction to all transaction for e-commerce
  2. To facilitate electronic filing of all documents to the government
  3. To amend Indian Penal Code, Indian Evidence Act, to punish the cyber crimes 
  4. All of the above 

Answer (Detailed Solution Below)

Option 4 : All of the above 

Information Technology Act Question 2 Detailed Solution

correct answer is (4)

Key Points The Information Technology Act, 2000 provides legal recognition for transactions carried out by means of electronic data interchange and other means of electronic communication, commonly referred to as "electronic commerce”, which involve the use of alternatives to paper based methods of communication and storage of information, to facilitate electronic filing of documents with the Government agencies and further to amend The Indian Penal Code, The Indian Evidence Act, 1872, The Banker’s Books Evidence Act, 1891 and The Reserve Bank of India Act, 1934 and for matters connected therewith or incidental thereto. 

Additional Information The Information Technology Act, 2000 has specified that Tampering with computer source documents, Hacking computer system, Publishing of information which is obscene in electronic form, failure to comply with Directions of Controller to a subscriber to extend facilities to decrypt information, accessing a protected system without proper authorization, Penalty for publishing Electronic Signature Certificate false particulars, Publication for fraudulent purpose, sending of grossly offensive information, false information, etc will be offences.

Also separate penalty is provided for each of these offences under IT Act,2000.

Important Points The amendment in 2008 brought a major change in Section 66A of the IT Act. This section provides for the punishment for sending any offensive messages through electronic mode. Any message or information that created hatred or hampered the integrity and security of the country was prohibited. But nowhere in this section "offensive" is defined and because of that there were seen many instances of misuse of this provision.

In case of Shreya Singhal v. Union of India (2015) the Supreme Court struck down this section.

Information Technology Act Question 3:

Mr. X, a person who is intended by Mr. Y an originator to receive the electronic record is, under the IT Act, known as _________.

  1. Intermediary
  2. Originators Agent
  3. Addressee
  4. Key Holder

Answer (Detailed Solution Below)

Option 3 : Addressee

Information Technology Act Question 3 Detailed Solution

The correct option is Addressee.

Key Points

  • Information Technology Act of 2000
    • It provides legal recognition for transactions carried out using electronic communications.
    • IT Act of 2000 was enacted by the Indian Parliament in June 2000.
    • This act has been made effective from 17th October 2000.
    • This Act applies to the whole of India. It also applies to any offence or contravention committed outside India by any person.
  • Objectives of the IT Act of 2000
    1. ​​To grant legal recognition to transactions carried out using commerce.
    2. To give legal recognition to Digital Signature for authentication of any information.
    3. To facilitate the electronic filing of documents with Government departments.
    4. To facilitate electronic storage of data.
    5. To set up authority for issues like privacy protection and computer crimes.
    6. To establish a Cyber Regulations Appellate Tribunal for hearing appeals against decisions of the adjudicating officers.
    7. To facilitate and give legal sanction to electronic transfers between banks and financial institutions.
    8. To give legal recognition for keeping books of account by Bankers in electronic form.
    9. To support the admission of computer evidence in courts.
  • Addressee:-
    • Section 2(1)(b) in The Information Technology Act of 2000 defines the term "addressee" means a person who is intended by the originator to receive the electronic record but does not include any intermediary.
    • The person or organization to which something, such as a letter or message, is addressed or sent for whom the item is intended.

Information Technology Act Question 4:

Mr. A who was aggrieved by an order made by Controller or an adjudicating officer, made an appeal to Cyber Appellate Tribunal. Later Mr. A aggrieved by an order of Cyber Appellate Tribunal, may prefer an appeal __________. 

  1. In any District Court
  2. In Higher Tribunal
  3. Only in High Court
  4. Only in Supreme Court

Answer (Detailed Solution Below)

Option 3 : Only in High Court

Information Technology Act Question 4 Detailed Solution

The correct option is Only in the High Court.

Key Points

  • Information Technology Act of 2000
    • It provides legal recognition for transactions carried out using electronic communications.
    • IT Act of 2000 was enacted by the Indian Parliament in June 2000.
    • This act has been made effective from 17th October 2000.
    • This Act applies to the whole of India.
    • It also applies to any offence or contravention committed outside India by any person.
  • Section 62 of the IT Act of 2000 provides a remedy to those appellants who are aggrieved from any order or decision of the Cyber Appellate Tribunal.
  • It stated, "Any person aggrieved by any decision or order of the Cyber Appellate Tribunal may file an appeal to the High Court within sixty days from the date of communication of the decision or order of the Cyber Appellate Tribunal to him on any question of fact or law arising out of such order."
  • If the High Court may be satisfied that the appellant was prevented by sufficient cause from filing the appeal within the said period, allow it to be filed within a further period not exceeding sixty days.

Information Technology Act Question 5:

Arrange in proper sequence the following benefits available to Information System Auditor who uses CATT:

A. Check susceptibility to threat. Much of the accounting is done through cloud accounts or other online system.

B. Evaluating the system

C. Data security

D. Bolsters controls

E. Develop IT Governance

Choose the correct answer from the options given below:

  1. E, D, C, B, A 
  2. C, B, A, D, E
  3. A, B, C, D, E
  4. B, A, E, C, D

Answer (Detailed Solution Below)

Option 3 : A, B, C, D, E

Information Technology Act Question 5 Detailed Solution

The correct answer is A, B, C, D, E.

Key PointsThe correct sequence is: 

A. Check susceptibility to threat. Much of the accounting is done through cloud accounts or other online systems.
Using CATT, auditors can assess the susceptibility of the accounting system to various threats, especially those related to online or cloud-based accounts. This step involves identifying potential risks and vulnerabilities in the system.

B. Evaluating the system
CATT helps auditors evaluate the information system by assessing its design, functionality, and effectiveness in achieving its objectives. This step involves examining the system's controls and processes.

C. Data security
CATT can be used to assess the security measures in place to protect sensitive data. It helps auditors identify any vulnerabilities or risks related to data security and provides recommendations for enhancing security measures.

D. Bolsters controls
CATT aids in strengthening internal controls by identifying weaknesses or gaps in the system. It allows auditors to test the effectiveness of controls and make recommendations for improving control mechanisms.

E. Develop IT Governance
Using CATT, auditors can evaluate the organization's IT governance framework. This step involves assessing the alignment of IT strategies and objectives with overall business goals and providing insights into improving IT governance practices.

Therefore, the correct sequence is:

A. Check susceptibility to threat. Much of the accounting is done through cloud accounts or other online systems.
B. Evaluating the system
C. Data security
D. Bolsters controls
E. Develop IT Governance

Information Technology Act Question 6:

Which section of the Information technology Act deals with he punishment for cheating by impersonation using computer resources?

  1. Section 66A
  2. Section 66B
  3. Section 66C
  4. Section 66D

Answer (Detailed Solution Below)

Option 4 : Section 66D

Information Technology Act Question 6 Detailed Solution

The correct answer is option 4) i.e. Section 66D.

  • Section 66D of the Information Technology act deals with punishment for cheating by personation using computer resources.
  • As per section 66D of the Information Technology act, whoever by means of any communication device or computer resource cheats by personation, has committed an offence under this section
  • Such a person shall be punished with imprisonment which may extend to three years and shall also be liable to fine which may extend to one lakh rupees.

Information Technology Act Question 7:

As per Section 77B of the Information Technology Act, which offence is bailable?

  1. Offence punishable with 7 years’ imprisonment
  2. Offence punishable with life imprisonment
  3. Offence punishable with exactly 3 years’ imprisonment
  4. Offence punishable with less than 3 years’ imprisonment

Answer (Detailed Solution Below)

Option 4 : Offence punishable with less than 3 years’ imprisonment

Information Technology Act Question 7 Detailed Solution

The correct answer is 'Offence punishable with less than 3 years' imprisonment'

Key Points

  • Section 77B of the Information Technology Act:
    • Section 77B of the IT Act specifically addresses the classification of offences as bailable or non-bailable.
    • According to this section, offences punishable with imprisonment for a term of less than three years are classified as bailable offences.
    • In a bailable offence, the accused has the legal right to be granted bail, which ensures that they are not detained unnecessarily during the trial process.
    • This provision ensures that minor offences under the IT Act, which carry lighter penalties, are treated with leniency while balancing the need for justice.
  • Incorrect Options:
    • Offence punishable with 7 years’ imprisonment:
      • Offences carrying a punishment of 7 years are considered more severe and are generally non-bailable under the IT Act.
      • Such cases often involve serious crimes such as cyber terrorism or breaches of national security.
    • Offence punishable with life imprisonment:
      • Offences punishable with life imprisonment are the most severe and are non-bailable under the IT Act.
      • These offences typically involve highly aggravated crimes that pose a significant threat to public safety or national interests.
    • Offence punishable with exactly 3 years’ imprisonment:
      • While offences with less than three years’ imprisonment are bailable, those punishable with exactly three years may be treated differently based on judicial interpretation and the nature of the crime.
      • Such offences may fall into a grey area and might not always qualify as bailable under Section 77B.
  • Importance of Section 77B:
    • This section provides clarity on the legal categorization of offences and their corresponding treatment during judicial proceedings.
    • It ensures proportionality in the handling of crimes under the IT Act, distinguishing between minor and serious offences.

Information Technology Act Question 8:

Under Section 78 of the Information Technology Act, who is authorized to investigate offences under the Act?

  1. Any head constable
  2. Magistrate only
  3. Police officer not below the rank of Inspector
  4. CID officer only

Answer (Detailed Solution Below)

Option 3 : Police officer not below the rank of Inspector

Information Technology Act Question 8 Detailed Solution

The correct answer is 'Police officer not below the rank of Inspector'

Key Points

  • Section 78 of the Information Technology (IT) Act, 2000:
    • This section specifies the authority responsible for investigating offences under the IT Act.
    • It mandates that only a police officer not below the rank of Inspector is authorized to investigate offences under this Act.
    • This provision ensures that investigations are handled by experienced and capable officers with adequate training and knowledge of the law, especially given the technical nature of cybercrimes.
    • The rank requirement minimizes the risk of misuse of authority and ensures proper procedural compliance during the investigation.
  • Explanation of Incorrect Options:
    • Any head constable:
      • A head constable is a lower-ranked police officer and is not authorized under Section 78 to investigate offences under the IT Act.
      • The complexity of cybercrimes and the legal framework requires officers of higher ranks with specialized training.
    • Magistrate only:
      • While magistrates play a crucial role in judicial proceedings, they do not conduct investigations. Their role is to oversee and ensure the legality of the investigation process and to deliver judgments based on evidence presented.
    • CID officer only:
      • CID (Criminal Investigation Department) officers do investigate crimes, but Section 78 does not specifically limit the authority to CID officers. The Act only specifies that the officer must be of the rank of Inspector or above, regardless of the department.
  • Importance of Section 78:
    • This section helps ensure that cybercrime investigations are conducted by officers with sufficient rank, experience, and accountability.
    • It also reinforces the seriousness of cybercrimes and the need for skilled personnel to handle such offences.

Information Technology Act Question 9:

What is a valid defence under Sections 67, 67A, and 67B of the Information Technology Act?

  1. The act was committed from a foreign location
  2. The content was published in interest of art or science
  3. The accused was unaware of the content
  4. The material was kept in personal storage

Answer (Detailed Solution Below)

Option 2 : The content was published in interest of art or science

Information Technology Act Question 9 Detailed Solution

The correct answer is 'The content was published in interest of art or science'

Key Points

  • Sections 67, 67A, and 67B of the Information Technology Act:
    • These sections deal with the publication, transmission, or sharing of obscene, sexually explicit content, or child pornography through electronic means.
    • Section 67 specifically prohibits publishing or transmitting obscene material in electronic form.
    • Section 67A addresses material that is sexually explicit, while Section 67B pertains to material depicting children in sexually explicit acts.
    • Violating these provisions can lead to stringent penalties, including imprisonment and fines.
  • Defence under these sections:
    • A valid defence under these sections is when the content is published or transmitted in the interest of art, science, literature, or learning, or for other purposes such as research or education.
    • This defence recognizes that certain forms of content, though sensitive in nature, may serve a legitimate purpose in these fields and are not intended to cause harm or exploitative behavior.
    • The burden of proving that the content was shared for such purposes lies with the accused.
  • Other options explained:
    • The act was committed from a foreign location: This is not a valid defence. The IT Act has extraterritorial jurisdiction under Section 75, meaning it applies to offences committed outside India if the computer system or network involved is located in India.
    • The accused was unaware of the content: Mere lack of awareness is not a valid defence. The prosecution must prove intent, but the accused cannot claim ignorance without sufficient evidence to support it.
    • The material was kept in personal storage: While personal storage might indicate the material was not intended for public transmission, it does not automatically provide immunity from the provisions of these sections.

Information Technology Act Question 10:

Which section of the Information Technology Act penalizes breach of confidentiality and privacy?

  1. Section 67
  2. Section 67A
  3. Section 72
  4. Section 78

Answer (Detailed Solution Below)

Option 3 : Section 72

Information Technology Act Question 10 Detailed Solution

The correct answer is 'Section 72'

Key Points

  • Section 72 of the Information Technology (IT) Act, 2000:
    • Section 72 specifically deals with the penalty for a breach of confidentiality and privacy under the IT Act, 2000.
    • It penalizes individuals who, without the consent of the person concerned, disclose information obtained while providing services under the IT Act.
    • The punishment under this section includes imprisonment for up to two years, or a fine of up to ₹1 lakh, or both.
    • This provision plays a critical role in safeguarding the confidentiality of sensitive personal information in a digital ecosystem.

Additional Information

  • Section 67:
    • This section penalizes the publishing or transmission of obscene material in electronic form.
    • It is unrelated to confidentiality or privacy breaches and is aimed at curbing obscenity in cyberspace.
  • Section 67A:
    • Section 67A deals with the publication or transmission of material containing sexually explicit acts in electronic form.
    • It is an extension of Section 67 but focuses on sexually explicit content rather than general obscenity or privacy breaches.
  • Section 78:
    • Section 78 authorizes police officers, not below the rank of Inspector, to investigate offenses under the IT Act.
    • It is procedural and does not deal with confidentiality or privacy breaches.
Get Free Access Now
Hot Links: teen patti download teen patti all games teen patti pro