SlideShare une entreprise Scribd logo
1  sur  4
1. Gender
□ Male
□ Female
2. Age
□ 1-20
□ 21-30
□ 31-40
□ 41-50
□ 51-60
3. Highest level of education completed
□ High schoolDegree
□ Associate degree
□ Bachelor’s degree
□ Master’s Degree
□ Doctoral Degree
□ Others
4. On an average how many hours per day do you use the computer?
□ 0-2
□ 2-5
□ 5-15
□ Daily
5. How would you rate your knowledge on computers?
□ Low
□ Moderate
□ High
□ Expert
6. Are you familiar with the term Cyber Crime?
□ Not Familiar
□ Somewhat familiar
□ Very familiar
□ Expert
7. Which of the following statements best matches your idea of what Cyber
Crime is?
□ Politically motivated attacks on computer systems of major infrastructures
such as airport or power plants to cause severe damages and disruptions
□ Terrorists using the computer network as a tool to spread political
propaganda to gather support and members
□ A criminal activity or a crime that involves the internet, a computer system
or a computer technology
□ A criminal offense involving a computer as the object of the crime, or the tool
used to commit a material component of the offense
8. Which of the following computer user groups are most vulnerable to Cyber
crime?
□ Government agencies
□ Financial institutions
□ Educational institutions
□ Private sector
□ Law enforcement agencies
□ Personal users
9. Which of the following activities do you consider safe when using your
computer?
□ Work related
□ On-line banking
□ Business data exchange
□ Random web browsing
□ Explicit web browsing
□ E-mail exchange
□ Use of Office tools
□ Instant messaging
□ On-line shopping
□ On-line game playing
□ Music/movie playing
10. Do you have anti-virus software installed on your computer?
□ Yes
□ No
□ Don’t Idea
11.Has your computer ever been infected by a computer virus that damaged
your computer components or data on your computer?
□ Yes
□ No
12.Have you ever re-uploaded the files that you downloaded?
□ Yes
□ No
13.Do you know that the file you download is copyrighted?
□ Yes
□ No
14.Have you ever installed pirated software?
□ Yes
□ No
15.If you tick 'yes', where did you get the software?
□ Downloaded
□ Bought from an IT shop in disk form
16.Have you ever cracked the software? *
□ Yes
□ No
17.Have you ever been hacked by someone?
□ Yes
□ No
If yes, Where?
□ E-mail
□ Blog
□ Social network
□ Other types of sites
18.Have you ever hacked someone's password?
□ Yes
□ No
19.If yes, What did you hack?
□ Wi-Fi password
□ Someone's account on a site
□ Someone's email account
□ Someone's password on his/her computer/laptop
20.Do/did you learn how to hack?
□ Yes
□ No
21.If you tick 'yes', where do/did you learn how to hack?
□ Internet
□ Books
□ From friends/acquaintance/family
22.Are you aware of any Laws related to Cyber crime?
□ Yes
□ No
23.Do you know what are remedies available for Cyber Crime if you are victim of
cyber offences?
□ Yes
□ No
24.Do you know where to file a case if you are victim of Cyber Crime?
□ Yes
□ N0
25.Do you know, you can file a complaint on-line?
□ Yes
□ No
26. Your View related to Cyber Crime and Cyber Laws?
________________________________________.
Name: -
Mob:-

Contenu connexe

Tendances

Online safety, security, ethics & etiquette
Online safety, security, ethics & etiquetteOnline safety, security, ethics & etiquette
Online safety, security, ethics & etiquetteAngelito Quiambao
 
Internet Threats
Internet ThreatsInternet Threats
Internet ThreatsRonalyn_Cao
 
Online Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment TechnologiesOnline Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment TechnologiesMark Jhon Oxillo
 
Empowerment Technologies - Online Safety, Ethics and Etiquette
Empowerment Technologies - Online Safety, Ethics and EtiquetteEmpowerment Technologies - Online Safety, Ethics and Etiquette
Empowerment Technologies - Online Safety, Ethics and EtiquetteJuan Miguel Palero
 
Securityawareness
SecurityawarenessSecurityawareness
SecurityawarenessJayfErika
 
Empowerment Technology Lesson 2
Empowerment Technology Lesson 2Empowerment Technology Lesson 2
Empowerment Technology Lesson 2alicelagajino
 
Online safety and security
Online safety and securityOnline safety and security
Online safety and securityjovellconde1
 
Security threats and safety measures
Security threats and safety measuresSecurity threats and safety measures
Security threats and safety measuresDnyaneshwar Beedkar
 
Edu352 week1discussion2technologysafetyoct2011crs
Edu352 week1discussion2technologysafetyoct2011crsEdu352 week1discussion2technologysafetyoct2011crs
Edu352 week1discussion2technologysafetyoct2011crssapphirecrs
 
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATSJazzyNF
 
Threats and Security Tips of Computer System
Threats and Security Tips of Computer SystemThreats and Security Tips of Computer System
Threats and Security Tips of Computer SystemFaruk_Hossen
 
Computer & internet Security
Computer & internet SecurityComputer & internet Security
Computer & internet SecurityGerard Lamusse
 

Tendances (15)

Online safety, security, ethics & etiquette
Online safety, security, ethics & etiquetteOnline safety, security, ethics & etiquette
Online safety, security, ethics & etiquette
 
Internet Threats
Internet ThreatsInternet Threats
Internet Threats
 
Online Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment TechnologiesOnline Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment Technologies
 
Empowerment Technologies - Online Safety, Ethics and Etiquette
Empowerment Technologies - Online Safety, Ethics and EtiquetteEmpowerment Technologies - Online Safety, Ethics and Etiquette
Empowerment Technologies - Online Safety, Ethics and Etiquette
 
Securityawareness
SecurityawarenessSecurityawareness
Securityawareness
 
Empowerment Technology Lesson 2
Empowerment Technology Lesson 2Empowerment Technology Lesson 2
Empowerment Technology Lesson 2
 
Online safety and security
Online safety and securityOnline safety and security
Online safety and security
 
Security threats and safety measures
Security threats and safety measuresSecurity threats and safety measures
Security threats and safety measures
 
Security awareness
Security awarenessSecurity awareness
Security awareness
 
Edu352 week1discussion2technologysafetyoct2011crs
Edu352 week1discussion2technologysafetyoct2011crsEdu352 week1discussion2technologysafetyoct2011crs
Edu352 week1discussion2technologysafetyoct2011crs
 
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
 
Cyber security
Cyber securityCyber security
Cyber security
 
Threats and Security Tips of Computer System
Threats and Security Tips of Computer SystemThreats and Security Tips of Computer System
Threats and Security Tips of Computer System
 
Computer & internet Security
Computer & internet SecurityComputer & internet Security
Computer & internet Security
 
Virus
VirusVirus
Virus
 

En vedette

Kurs bokmelding
Kurs bokmeldingKurs bokmelding
Kurs bokmeldingsveio
 
최종 컬러베스
최종 컬러베스최종 컬러베스
최종 컬러베스승주 양
 
SUDESHNA DAS_resume
SUDESHNA DAS_resumeSUDESHNA DAS_resume
SUDESHNA DAS_resumeSudeshna Das
 
Desktop enviroment shamsa altayer 10bg
Desktop enviroment shamsa altayer 10bgDesktop enviroment shamsa altayer 10bg
Desktop enviroment shamsa altayer 10bgshamsaot
 
Radio Interview Techniques
Radio Interview TechniquesRadio Interview Techniques
Radio Interview Techniquesitsewelinaxo
 
Training Teradata 2010-2015
Training Teradata 2010-2015Training Teradata 2010-2015
Training Teradata 2010-2015Wim van Leijden
 
0tema 1 consti_patata_puntos-patatabrava.docx
0tema 1 consti_patata_puntos-patatabrava.docx0tema 1 consti_patata_puntos-patatabrava.docx
0tema 1 consti_patata_puntos-patatabrava.docxGulusa Boso
 
Herman Monteberos Duero
Herman Monteberos DueroHerman Monteberos Duero
Herman Monteberos DueroHerman Duero
 
Paul_joshua_resume_JAN2016
Paul_joshua_resume_JAN2016Paul_joshua_resume_JAN2016
Paul_joshua_resume_JAN2016paul joshua
 
Presentazione di ITALIA MEDIAZIONE
Presentazione di ITALIA MEDIAZIONEPresentazione di ITALIA MEDIAZIONE
Presentazione di ITALIA MEDIAZIONEsandro grimaldi
 
Guest Check Overview
Guest Check OverviewGuest Check Overview
Guest Check OverviewDerek Wood
 
14185356 양승주
14185356 양승주14185356 양승주
14185356 양승주승주 양
 
CV_Woodcock_July_2015
CV_Woodcock_July_2015CV_Woodcock_July_2015
CV_Woodcock_July_2015Eric Woodcock
 
Shamsa altayer
Shamsa altayerShamsa altayer
Shamsa altayershamsaot
 
Presentacion de ingles
Presentacion de inglesPresentacion de ingles
Presentacion de ingleskatitoDeras
 

En vedette (20)

Kurs bokmelding
Kurs bokmeldingKurs bokmelding
Kurs bokmelding
 
Automotive session 1
Automotive session 1 Automotive session 1
Automotive session 1
 
최종 컬러베스
최종 컬러베스최종 컬러베스
최종 컬러베스
 
Upcycling2
Upcycling2Upcycling2
Upcycling2
 
SUDESHNA DAS_resume
SUDESHNA DAS_resumeSUDESHNA DAS_resume
SUDESHNA DAS_resume
 
Desktop enviroment shamsa altayer 10bg
Desktop enviroment shamsa altayer 10bgDesktop enviroment shamsa altayer 10bg
Desktop enviroment shamsa altayer 10bg
 
Radio Interview Techniques
Radio Interview TechniquesRadio Interview Techniques
Radio Interview Techniques
 
Training Teradata 2010-2015
Training Teradata 2010-2015Training Teradata 2010-2015
Training Teradata 2010-2015
 
Upcycling3
Upcycling3Upcycling3
Upcycling3
 
Upcycling2
Upcycling2Upcycling2
Upcycling2
 
0tema 1 consti_patata_puntos-patatabrava.docx
0tema 1 consti_patata_puntos-patatabrava.docx0tema 1 consti_patata_puntos-patatabrava.docx
0tema 1 consti_patata_puntos-patatabrava.docx
 
Herman Monteberos Duero
Herman Monteberos DueroHerman Monteberos Duero
Herman Monteberos Duero
 
499 Final Project
499 Final Project499 Final Project
499 Final Project
 
Paul_joshua_resume_JAN2016
Paul_joshua_resume_JAN2016Paul_joshua_resume_JAN2016
Paul_joshua_resume_JAN2016
 
Presentazione di ITALIA MEDIAZIONE
Presentazione di ITALIA MEDIAZIONEPresentazione di ITALIA MEDIAZIONE
Presentazione di ITALIA MEDIAZIONE
 
Guest Check Overview
Guest Check OverviewGuest Check Overview
Guest Check Overview
 
14185356 양승주
14185356 양승주14185356 양승주
14185356 양승주
 
CV_Woodcock_July_2015
CV_Woodcock_July_2015CV_Woodcock_July_2015
CV_Woodcock_July_2015
 
Shamsa altayer
Shamsa altayerShamsa altayer
Shamsa altayer
 
Presentacion de ingles
Presentacion de inglesPresentacion de ingles
Presentacion de ingles
 

Similaire à Questionnair of cyber crime with information technology act

Cyber-Safety and Digital Citizenship
Cyber-Safety and Digital CitizenshipCyber-Safety and Digital Citizenship
Cyber-Safety and Digital CitizenshipPantegoChristian
 
Using the Internet Safely
Using the Internet SafelyUsing the Internet Safely
Using the Internet SafelyJoanne Hewitt
 
Your e image presentation 2
Your e image presentation 2Your e image presentation 2
Your e image presentation 2opiedog1
 
Parent engagement cvps
Parent engagement cvpsParent engagement cvps
Parent engagement cvpsjeygenraam
 
Cyber Crime & Prevention
Cyber Crime & Prevention Cyber Crime & Prevention
Cyber Crime & Prevention RAUSHAN KUMAR
 
Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Jesus Rances
 
Digital safety[1]
Digital safety[1]Digital safety[1]
Digital safety[1]sheenau
 
Digital Literacy
Digital LiteracyDigital Literacy
Digital LiteracyMiles Berry
 
SIT Summer School (Cyber Security)
SIT Summer School (Cyber Security)SIT Summer School (Cyber Security)
SIT Summer School (Cyber Security)Apurv Singh Gautam
 
Empowerment lesson 2.ppt
Empowerment lesson 2.pptEmpowerment lesson 2.ppt
Empowerment lesson 2.pptAndrew_Braza
 
Virus Spyware Quiz
Virus Spyware QuizVirus Spyware Quiz
Virus Spyware QuizPEC
 
Informal Learning and Moodle
Informal Learning and MoodleInformal Learning and Moodle
Informal Learning and MoodleMiles Berry
 
Keeping Your Child Safe On The Internet
Keeping Your Child Safe On The Internet Keeping Your Child Safe On The Internet
Keeping Your Child Safe On The Internet Eanes isd
 
Advantages and disadvantages of computer system
Advantages and disadvantages of computer systemAdvantages and disadvantages of computer system
Advantages and disadvantages of computer systemparag dhok
 
Cyber Security For Kids by Shounak Ray Chaudhuri
Cyber Security For Kids by Shounak Ray Chaudhuri Cyber Security For Kids by Shounak Ray Chaudhuri
Cyber Security For Kids by Shounak Ray Chaudhuri Moumita Chatterjee
 

Similaire à Questionnair of cyber crime with information technology act (20)

Y2 l10 esafety
Y2 l10 esafetyY2 l10 esafety
Y2 l10 esafety
 
Cyber-Safety and Digital Citizenship
Cyber-Safety and Digital CitizenshipCyber-Safety and Digital Citizenship
Cyber-Safety and Digital Citizenship
 
Using the Internet Safely
Using the Internet SafelyUsing the Internet Safely
Using the Internet Safely
 
Log Out Cyber Awareness
Log Out Cyber AwarenessLog Out Cyber Awareness
Log Out Cyber Awareness
 
Your e image presentation 2
Your e image presentation 2Your e image presentation 2
Your e image presentation 2
 
Parent engagement cvps
Parent engagement cvpsParent engagement cvps
Parent engagement cvps
 
Cyber Crime & Prevention
Cyber Crime & Prevention Cyber Crime & Prevention
Cyber Crime & Prevention
 
EMPOW 11.pptx
EMPOW 11.pptxEMPOW 11.pptx
EMPOW 11.pptx
 
Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Empowerment Technologies - Module 2
Empowerment Technologies - Module 2
 
Digital safety[1]
Digital safety[1]Digital safety[1]
Digital safety[1]
 
Digital Literacy
Digital LiteracyDigital Literacy
Digital Literacy
 
Presentation5 powerpint
Presentation5 powerpintPresentation5 powerpint
Presentation5 powerpint
 
SIT Summer School (Cyber Security)
SIT Summer School (Cyber Security)SIT Summer School (Cyber Security)
SIT Summer School (Cyber Security)
 
Empowerment lesson 2.ppt
Empowerment lesson 2.pptEmpowerment lesson 2.ppt
Empowerment lesson 2.ppt
 
Virus Spyware Quiz
Virus Spyware QuizVirus Spyware Quiz
Virus Spyware Quiz
 
Lesson 1
Lesson 1Lesson 1
Lesson 1
 
Informal Learning and Moodle
Informal Learning and MoodleInformal Learning and Moodle
Informal Learning and Moodle
 
Keeping Your Child Safe On The Internet
Keeping Your Child Safe On The Internet Keeping Your Child Safe On The Internet
Keeping Your Child Safe On The Internet
 
Advantages and disadvantages of computer system
Advantages and disadvantages of computer systemAdvantages and disadvantages of computer system
Advantages and disadvantages of computer system
 
Cyber Security For Kids by Shounak Ray Chaudhuri
Cyber Security For Kids by Shounak Ray Chaudhuri Cyber Security For Kids by Shounak Ray Chaudhuri
Cyber Security For Kids by Shounak Ray Chaudhuri
 

Dernier

LITERAL RULE OF INTERPRETATION - PRIMARY RULE
LITERAL RULE OF INTERPRETATION - PRIMARY RULELITERAL RULE OF INTERPRETATION - PRIMARY RULE
LITERAL RULE OF INTERPRETATION - PRIMARY RULEsreeramsaipranitha
 
Appeal and Revision in Income Tax Act.pdf
Appeal and Revision in Income Tax Act.pdfAppeal and Revision in Income Tax Act.pdf
Appeal and Revision in Income Tax Act.pdfPoojaGadiya1
 
BPA GROUP 7 - DARIO VS. MISON REPORTING.pdf
BPA GROUP 7 - DARIO VS. MISON REPORTING.pdfBPA GROUP 7 - DARIO VS. MISON REPORTING.pdf
BPA GROUP 7 - DARIO VS. MISON REPORTING.pdflaysamaeguardiano
 
Human Rights_FilippoLuciani diritti umani.pptx
Human Rights_FilippoLuciani diritti umani.pptxHuman Rights_FilippoLuciani diritti umani.pptx
Human Rights_FilippoLuciani diritti umani.pptxfilippoluciani9
 
一比一原版西澳大学毕业证学位证书
 一比一原版西澳大学毕业证学位证书 一比一原版西澳大学毕业证学位证书
一比一原版西澳大学毕业证学位证书SS A
 
CAFC Chronicles: Costly Tales of Claim Construction Fails
CAFC Chronicles: Costly Tales of Claim Construction FailsCAFC Chronicles: Costly Tales of Claim Construction Fails
CAFC Chronicles: Costly Tales of Claim Construction FailsAurora Consulting
 
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top BoutiqueAndrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top BoutiqueSkyLaw Professional Corporation
 
Transferable and Non-Transferable Property.pptx
Transferable and Non-Transferable Property.pptxTransferable and Non-Transferable Property.pptx
Transferable and Non-Transferable Property.pptx2020000445musaib
 
$ Love Spells^ 💎 (310) 882-6330 in Utah, UT | Psychic Reading Best Black Magi...
$ Love Spells^ 💎 (310) 882-6330 in Utah, UT | Psychic Reading Best Black Magi...$ Love Spells^ 💎 (310) 882-6330 in Utah, UT | Psychic Reading Best Black Magi...
$ Love Spells^ 💎 (310) 882-6330 in Utah, UT | Psychic Reading Best Black Magi...PsychicRuben LoveSpells
 
WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)Delhi Call girls
 
pnp FIRST-RESPONDER-IN-CRIME-SCENEs.pptx
pnp FIRST-RESPONDER-IN-CRIME-SCENEs.pptxpnp FIRST-RESPONDER-IN-CRIME-SCENEs.pptx
pnp FIRST-RESPONDER-IN-CRIME-SCENEs.pptxPSSPRO12
 
3 Formation of Company.www.seribangash.com.ppt
3 Formation of Company.www.seribangash.com.ppt3 Formation of Company.www.seribangash.com.ppt
3 Formation of Company.www.seribangash.com.pptseri bangash
 
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURYA SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURYJulian Scutts
 
Municipal-Council-Ratlam-vs-Vardi-Chand-A-Landmark-Writ-Case.pptx
Municipal-Council-Ratlam-vs-Vardi-Chand-A-Landmark-Writ-Case.pptxMunicipal-Council-Ratlam-vs-Vardi-Chand-A-Landmark-Writ-Case.pptx
Municipal-Council-Ratlam-vs-Vardi-Chand-A-Landmark-Writ-Case.pptxSHIVAMGUPTA671167
 
COPYRIGHTS - PPT 01.12.2023 part- 2.pptx
COPYRIGHTS - PPT 01.12.2023 part- 2.pptxCOPYRIGHTS - PPT 01.12.2023 part- 2.pptx
COPYRIGHTS - PPT 01.12.2023 part- 2.pptxRRR Chambers
 
Presentation on Corporate SOCIAL RESPONSIBILITY- PPT.pptx
Presentation on Corporate SOCIAL RESPONSIBILITY- PPT.pptxPresentation on Corporate SOCIAL RESPONSIBILITY- PPT.pptx
Presentation on Corporate SOCIAL RESPONSIBILITY- PPT.pptxRRR Chambers
 
Shubh_Burden of proof_Indian Evidence Act.pptx
Shubh_Burden of proof_Indian Evidence Act.pptxShubh_Burden of proof_Indian Evidence Act.pptx
Shubh_Burden of proof_Indian Evidence Act.pptxShubham Wadhonkar
 
一比一原版旧金山州立大学毕业证学位证书
 一比一原版旧金山州立大学毕业证学位证书 一比一原版旧金山州立大学毕业证学位证书
一比一原版旧金山州立大学毕业证学位证书SS A
 
How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...
How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...
How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...Finlaw Associates
 
Chp 1- Contract and its kinds-business law .ppt
Chp 1- Contract and its kinds-business law .pptChp 1- Contract and its kinds-business law .ppt
Chp 1- Contract and its kinds-business law .pptzainabbkhaleeq123
 

Dernier (20)

LITERAL RULE OF INTERPRETATION - PRIMARY RULE
LITERAL RULE OF INTERPRETATION - PRIMARY RULELITERAL RULE OF INTERPRETATION - PRIMARY RULE
LITERAL RULE OF INTERPRETATION - PRIMARY RULE
 
Appeal and Revision in Income Tax Act.pdf
Appeal and Revision in Income Tax Act.pdfAppeal and Revision in Income Tax Act.pdf
Appeal and Revision in Income Tax Act.pdf
 
BPA GROUP 7 - DARIO VS. MISON REPORTING.pdf
BPA GROUP 7 - DARIO VS. MISON REPORTING.pdfBPA GROUP 7 - DARIO VS. MISON REPORTING.pdf
BPA GROUP 7 - DARIO VS. MISON REPORTING.pdf
 
Human Rights_FilippoLuciani diritti umani.pptx
Human Rights_FilippoLuciani diritti umani.pptxHuman Rights_FilippoLuciani diritti umani.pptx
Human Rights_FilippoLuciani diritti umani.pptx
 
一比一原版西澳大学毕业证学位证书
 一比一原版西澳大学毕业证学位证书 一比一原版西澳大学毕业证学位证书
一比一原版西澳大学毕业证学位证书
 
CAFC Chronicles: Costly Tales of Claim Construction Fails
CAFC Chronicles: Costly Tales of Claim Construction FailsCAFC Chronicles: Costly Tales of Claim Construction Fails
CAFC Chronicles: Costly Tales of Claim Construction Fails
 
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top BoutiqueAndrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
 
Transferable and Non-Transferable Property.pptx
Transferable and Non-Transferable Property.pptxTransferable and Non-Transferable Property.pptx
Transferable and Non-Transferable Property.pptx
 
$ Love Spells^ 💎 (310) 882-6330 in Utah, UT | Psychic Reading Best Black Magi...
$ Love Spells^ 💎 (310) 882-6330 in Utah, UT | Psychic Reading Best Black Magi...$ Love Spells^ 💎 (310) 882-6330 in Utah, UT | Psychic Reading Best Black Magi...
$ Love Spells^ 💎 (310) 882-6330 in Utah, UT | Psychic Reading Best Black Magi...
 
WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)
 
pnp FIRST-RESPONDER-IN-CRIME-SCENEs.pptx
pnp FIRST-RESPONDER-IN-CRIME-SCENEs.pptxpnp FIRST-RESPONDER-IN-CRIME-SCENEs.pptx
pnp FIRST-RESPONDER-IN-CRIME-SCENEs.pptx
 
3 Formation of Company.www.seribangash.com.ppt
3 Formation of Company.www.seribangash.com.ppt3 Formation of Company.www.seribangash.com.ppt
3 Formation of Company.www.seribangash.com.ppt
 
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURYA SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
 
Municipal-Council-Ratlam-vs-Vardi-Chand-A-Landmark-Writ-Case.pptx
Municipal-Council-Ratlam-vs-Vardi-Chand-A-Landmark-Writ-Case.pptxMunicipal-Council-Ratlam-vs-Vardi-Chand-A-Landmark-Writ-Case.pptx
Municipal-Council-Ratlam-vs-Vardi-Chand-A-Landmark-Writ-Case.pptx
 
COPYRIGHTS - PPT 01.12.2023 part- 2.pptx
COPYRIGHTS - PPT 01.12.2023 part- 2.pptxCOPYRIGHTS - PPT 01.12.2023 part- 2.pptx
COPYRIGHTS - PPT 01.12.2023 part- 2.pptx
 
Presentation on Corporate SOCIAL RESPONSIBILITY- PPT.pptx
Presentation on Corporate SOCIAL RESPONSIBILITY- PPT.pptxPresentation on Corporate SOCIAL RESPONSIBILITY- PPT.pptx
Presentation on Corporate SOCIAL RESPONSIBILITY- PPT.pptx
 
Shubh_Burden of proof_Indian Evidence Act.pptx
Shubh_Burden of proof_Indian Evidence Act.pptxShubh_Burden of proof_Indian Evidence Act.pptx
Shubh_Burden of proof_Indian Evidence Act.pptx
 
一比一原版旧金山州立大学毕业证学位证书
 一比一原版旧金山州立大学毕业证学位证书 一比一原版旧金山州立大学毕业证学位证书
一比一原版旧金山州立大学毕业证学位证书
 
How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...
How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...
How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...
 
Chp 1- Contract and its kinds-business law .ppt
Chp 1- Contract and its kinds-business law .pptChp 1- Contract and its kinds-business law .ppt
Chp 1- Contract and its kinds-business law .ppt
 

Questionnair of cyber crime with information technology act

  • 1. 1. Gender □ Male □ Female 2. Age □ 1-20 □ 21-30 □ 31-40 □ 41-50 □ 51-60 3. Highest level of education completed □ High schoolDegree □ Associate degree □ Bachelor’s degree □ Master’s Degree □ Doctoral Degree □ Others 4. On an average how many hours per day do you use the computer? □ 0-2 □ 2-5 □ 5-15 □ Daily 5. How would you rate your knowledge on computers? □ Low □ Moderate □ High □ Expert 6. Are you familiar with the term Cyber Crime? □ Not Familiar □ Somewhat familiar □ Very familiar □ Expert
  • 2. 7. Which of the following statements best matches your idea of what Cyber Crime is? □ Politically motivated attacks on computer systems of major infrastructures such as airport or power plants to cause severe damages and disruptions □ Terrorists using the computer network as a tool to spread political propaganda to gather support and members □ A criminal activity or a crime that involves the internet, a computer system or a computer technology □ A criminal offense involving a computer as the object of the crime, or the tool used to commit a material component of the offense 8. Which of the following computer user groups are most vulnerable to Cyber crime? □ Government agencies □ Financial institutions □ Educational institutions □ Private sector □ Law enforcement agencies □ Personal users 9. Which of the following activities do you consider safe when using your computer? □ Work related □ On-line banking □ Business data exchange □ Random web browsing □ Explicit web browsing □ E-mail exchange □ Use of Office tools □ Instant messaging □ On-line shopping □ On-line game playing □ Music/movie playing 10. Do you have anti-virus software installed on your computer? □ Yes □ No □ Don’t Idea 11.Has your computer ever been infected by a computer virus that damaged your computer components or data on your computer? □ Yes
  • 3. □ No 12.Have you ever re-uploaded the files that you downloaded? □ Yes □ No 13.Do you know that the file you download is copyrighted? □ Yes □ No 14.Have you ever installed pirated software? □ Yes □ No 15.If you tick 'yes', where did you get the software? □ Downloaded □ Bought from an IT shop in disk form 16.Have you ever cracked the software? * □ Yes □ No 17.Have you ever been hacked by someone? □ Yes □ No If yes, Where? □ E-mail □ Blog □ Social network □ Other types of sites 18.Have you ever hacked someone's password? □ Yes □ No 19.If yes, What did you hack? □ Wi-Fi password □ Someone's account on a site □ Someone's email account □ Someone's password on his/her computer/laptop 20.Do/did you learn how to hack?
  • 4. □ Yes □ No 21.If you tick 'yes', where do/did you learn how to hack? □ Internet □ Books □ From friends/acquaintance/family 22.Are you aware of any Laws related to Cyber crime? □ Yes □ No 23.Do you know what are remedies available for Cyber Crime if you are victim of cyber offences? □ Yes □ No 24.Do you know where to file a case if you are victim of Cyber Crime? □ Yes □ N0 25.Do you know, you can file a complaint on-line? □ Yes □ No 26. Your View related to Cyber Crime and Cyber Laws? ________________________________________. Name: - Mob:-