Change set

Pick exam & year, then Go.

Question map
Not attempted Correct Incorrect ★ Bookmarked
Loading…
Q146 (CISF/2025) Science & Technology › ICT, AI, Cybersecurity & Emerging Tech

Consider the following :
1. Stealing computer hardware
2. Cyber bullying
3. Cyber stalking
4. Phishing
Which of the above are examples of cybercrime ?

Explanation

Cybercrime is defined as any criminal activity that involves a computer, networked device, or a network. These crimes generally fall into two categories: those that target computers/networks directly and those that use computers/networks to commit other crimes.

  • Cyber bullying: The use of electronic communication to bully a person, typically by sending messages of an intimidating or threatening nature.
  • Cyber stalking: The use of the internet or other electronic means to stalk or harass an individual, group, or organization.
  • Phishing: A fraudulent practice of sending emails or messages purporting to be from reputable companies to induce individuals to reveal personal information.

Stealing computer hardware is a physical crime (theft of tangible property) and is prosecuted under general criminal laws (such as the Indian Penal Code/BNS) rather than cyber laws, as the act itself does not require a digital interface or network to be executed.

✓ Thank you! We'll review this.

SIMILAR QUESTIONS

CAPF · 2008 · Q114 Relevance score: -3.49

Consider the following statements : 1. Ian Wilmut produced the first portable computer. 2. Adam Osborne created the first cloned sheep. Which of the statements given above is/are correct ?

IAS · 2004 · Q38 Relevance score: -3.64

Consider the following statements: 1. Adam Osborne produced the first portable computer. 2. Ian Wilmut created the first cloned sheep. Which of the statements given above is/ are correct?

CAPF · 2022 · Q95 Relevance score: -3.92

Consider the following statements with reference to the latest guidelines issued by the Indian Computer Emergency Response Team (CERT-In): 1. Data centres and service providers shall compulsorily report cyber security breaches within 24 hours. 2. Virtual Private Network providers shall retain user data for at least five years and share records with authorities when required. Which of the statements given above is/are correct?

CDS-II · 2010 · Q19 Relevance score: -4.04

In IP Spoofing