Hammad Raza.
Hammad Raza.
Lectures
Course Code Course Title Credits /Week
About the Course: This course introduces the field of Data Science, covering the fundamental concepts,
techniques, and tools used for data analysis, machine learning, and data visualization. Students will learn
how to preprocess and analyze data, build predictive models, evaluate model performance, and effectively
communicate insights through visualizations. The course also explores data management principles and
practices. Practical hands-on exercises and projects using popular Data Science libraries and technologies
are included to reinforce the concepts learned.
Course Objectives:
• Understand the foundations and scope of Data Science, including its applications and comparison
to related fields like Business Intelligence and Artificial Intelligence.
• Develop skills in data preprocessing, including cleaning, transforming, selecting, and merging
data, to ensure data quality and suitability for analysis.
• Gain knowledge of machine learning algorithms and techniques, such as regression, classification,
clustering, and ensemble learning, to build predictive models and make data-driven decisions.
• Learn how to evaluate and select models using appropriate evaluation metrics and crossvalidation
techniques to ensure reliable and robust model performance.
• Develop proficiency in data visualization techniques and tools to effectively communicate insights
and tell compelling stories using data.
Learning Outcomes:
After successful completion of this course, students would be able to
• Apply data preprocessing techniques to clean and transform raw data, handle missing values and
outliers, and merge datasets.
• Implement machine-learning algorithms to perform tasks such as regression, classification,
clustering, and ensemble learning.
• Evaluate and compare different machine learning models using appropriate evaluation metrics and
cross-validation techniques.
• Create informative and visually appealing data visualizations to communicate insights and
patterns in data.
• Understand the principles and practices of data management, including data governance, data
quality assurance, and data privacy considerations.
Topics No of
Unit Lectures
Introduction to Data Science and Data Preprocessing
Page 2 of 28
Model Evaluation, Data Visualization, and Management
Textbook(s):
1. Data Science from Scratch First Principles with Python- Joel Grus O'reilly, 2nd Edition
2. Advancing into Analytics From Excel to Python and R, George Mount, Oreilly, First Edition
3. Introduction to Machine Learning with Python, Andreas C. Muller, Sarah Guido, Oreilly, First
Edition
Additional Reference(s):
1. Doing Data Science, Rachel Schutt and Cathy O’Neil, O’Reilly,2013
2. Mastering Machine Learning with R, Cory Lesmeister, PACKT Publication,2015
3. Hands-On Programming with R, Garrett Grolemund,1st Edition, 2014
4. An Introduction to Statistical Learning, James, G., Witten, D., Hastie, T., Tibshirani,
R.,Springer,2015
Page 3 of 28
T.Y.B.Sc. (CS) Sem VI Data Science Question Bank
Unit I
Data Preprocessing:
1. Demonstrate the importance of data cleaning in the context of Data Science projects.
2. Describe the steps involved in data cleaning and the techniques used to handle missing values,
outliers, and duplicates.
3. Explain the rationale behind data transformation techniques such as scaling, normalization,
and encoding categorical variables.
4. Discuss the importance of feature selection in machine learning models and the criteria used
for selecting relevant features.
5. Outline the process of data merging and the challenges associated with combining multiple
Page 4 of 28
datasets for analysis.
6. Discuss the challenges and strategies involved in data merging when combining multiple
datasets for analysis.
7. Analyze the impact of data preprocessing on the quality and effectiveness of machine learning
algorithms.
Unit II
Exploratory Data Analysis (EDA):
1. Explain the importance of exploratory data analysis (EDA) in the data science process.
2. Describe three data visualization techniques commonly used in EDA and their applications.
3. Discuss the role of histograms, scatter plots, and box plots in understanding the distribution
and relationships within a dataset.
4. Define descriptive statistics and provide examples of commonly used measures such as mean,
median, and standard deviation. OR Define descriptive statistics and discuss their role in
summarizing and understanding datasets. Compare and contrast measures such as mean,
median, mode, and standard deviation.
5. Discuss the significance of histograms, scatter plots, and box plots in visualizing different
Page 5 of 28
types of data distributions.
6. Explain the concept of hypothesis testing and provide examples of situations where t-tests,
chi-square tests, and ANOVA are applicable.
Regression Analysis:
1. Explain the principles of simple linear regression and its applications in predictive modeling.
2. Discuss the assumptions underlying multiple linear regression and how they can be validated.
3. Outline the steps involved in conducting stepwise regression and its advantages in model
selection.
4. Describe logistic regression and its use in binary classification problems. OR Discuss the
application of logistic regression in classification tasks and its advantages over linear
regression.
5. Compare and contrast the assumptions underlying linear regression and logistic regression
models.
Page 6 of 28
Machine Learning Algorithms:
1. Describe the decision tree algorithm and its advantages and limitations in classification and
regression tasks.
2. Explain the principles of decision trees and random forests and their advantages in handling
nonlinear relationships and feature interactions.
3. Discuss the mathematical intuition behind support vector machines (SVM) and their
applications in both classification and regression tasks.
4. Describe artificial neural networks (ANN) and their architecture, including input, hidden, and
output layers.
5. Compare and contrast ensemble learning techniques like boosting and bagging, highlighting
their strengths and weaknesses.
6. Discuss the working principle of K-nearest neighbors (K-NN) algorithm and its use in
classification and regression tasks.
7. Explain the concept of gradient descent and its role in optimizing the parameters of machine
learning models.
Unit III
Page 7 of 28
Data Management:
1. Define data management activities and their role in ensuring data quality and usability. OR
Provide an overview of data management activities and their importance in ensuring data
quality and usability.
2. Explain the concept of data pipelines and the stages involved in the data extraction,
transformation, and loading (ETL) process.
3. Discuss the importance of data governance and data quality assurance in maintaining data
integrity and reliability.
4. Discuss the importance of data governance and data quality assurance in maintaining data
integrity and compliance with regulatory standards.
5. Describe the considerations for data privacy and security in data management practices. Discuss
strategies for protecting sensitive data and complying with regulations such as GDPR and
HIPAA.
6. Explain the considerations and best practices for ensuring data privacy and security throughout
the data management process. What measures can organizations implement to protect sensitive
information?
7. Discuss the ethical considerations surrounding data privacy and security, including regulatory
compliance and measures to protect sensitive information.
8. Analyze the considerations for data privacy and security in data management practices. How
can organizations protect sensitive data while still enabling data-driven insights? OR Explain the
considerations for data privacy and security in data management practices. What measures
should organizations take to protect sensitive data?
Page 8 of 28
Lectures
Course Code Course Title Credits /Week
About the Course: The course "Cloud Computing and Web Services" provides an in-depth understanding
of cloud computing fundamentals and web service technologies. Students will learn about different types
of clouds, cloud deployment models, and cloud platforms. They will also explore key concepts of
virtualization, security in cloud computing, and popular cloud computing platforms such as OpenStack
and AWS. Through practical exercises and hands-on projects, students will gain the skills required to
design, deploy, and manage cloud-based applications and services.
Course Objectives:
• Understand the basics of cloud computing, including types of clouds, deployment models, and
essential characteristics of cloud platforms.
• Explore web services technologies such as SOAP and REST and understand their role in
distributed computing and parallel computing.
• Gain proficiency in utilizing virtualization technologies, including creating virtual machines and
managing virtualized environments using tools like KVM and oVirt.
• Explore and utilize popular cloud computing platforms such as OpenStack and AWS to architect,
deploy, and manage cloud-based applications and services.
• Learn about cloud security fundamentals, including confidentiality, integrity, availability, and
secure development practices.
Learning Outcomes:
After successful completion of this course, students would be able to
• Demonstrate a comprehensive understanding of cloud computing concepts, including different
types of clouds and their characteristics.
• Implement and utilize web service technologies, such as SOAP and REST, to develop distributed
and parallel computing applications.
• Design, deploy, and manage cloud-based applications and services using popular cloud computing
platforms such as OpenStack and AWS.
• Apply secure development practices and implement cloud security policies to ensure the
confidentiality, integrity, and availability of cloud software solutions.
• Utilize virtualization technologies to create and manage virtualized environments, considering the
benefits and drawbacks of virtualization.
Topics No of
Unit Lectures
Page 9 of 28
Cloud Computing Basics
Cloud Applications
CloudSim: Introduction to Simulator, understanding CloudSim simulator,
CloudSim Architecture(User code, CloudSim, GridSim, SimJava)
Understanding Working platform for CloudSim,
OpenStack: Introduction to OpenStack, OpenStack test-drive, Basic
OpenStack operations, OpenStack CLI and APIs, Tenant model operations,
III Quotas, Private cloud building blocks, Controller deployment, Networking 15
deployment, Block Storage deployment, Compute deployment, deploying
and utilizing OpenStack in production environments, Building a production
environment, Application orchestration using OpenStack Heat
AWS: Architecting on AWS, Building complex solutions with Amazon
Virtual Private Cloud (Amazon VPC)
Page 10 of 28
T.Y.B.Sc. (CS) Sem VI Cloud Computing and Web Services Question Bank
Unit 1
Page 11 of 28
Unit 2
Page 12 of 28
Unit 3
Page 13 of 28
Lectures
Course Code Course Title Credits /Week
About the Course: This course provides a comprehensive understanding of Wireless Sensor Networks
(WSNs) and their applications. It covers the fundamental concepts, architectural elements, advantages,
and challenges of WSNs. Students will explore sensor node technology, network architecture,
optimization goals, and design principles for WSNs. The course also delves into wireless transmission,
telecommunication systems, and introduces the concepts of WSN operating systems and ad-hoc networks.
Through practical examples and case studies, students will gain hands-on experience in medium access
control protocols, routing strategies, transport control protocols, and WSN middleware architecture.
Course Objectives:
• Provide students with a comprehensive understanding of Wireless Sensor Networks (WSNs),
including their basic architectural elements, advantages, and challenges.
• Introduce students to the key technologies and protocols used in WSNs, such as medium access
control (MAC) protocols, routing strategies, and transport control protocols.
• Familiarize students with wireless transmission principles and telecommunication systems
relevant to WSNs, including frequency, signals, antennas, and satellite systems.
• Develop students' practical skills in designing and implementing WSN solutions by exploring
WSN operating systems, ad-hoc networks, and optimization goals.
Learning Outcomes:
After successful completion of this course, students would be able to
• Understand the fundamental concepts, architectural elements, and optimization goals of Wireless
Sensor Networks (WSNs) and apply this knowledge to analyze and design WSN solutions.
• Evaluate and compare different medium access control protocols and routing strategies in WSNs,
and make informed decisions to ensure efficient and reliable communication.
• Demonstrate knowledge of wireless transmission technologies, such as frequency, signals,
antennas, and propagation, and analyze their impact on WSN performance.
• Assess the role of telecommunication systems, satellite, broadcast systems in WSNs, and
understand their applications and implications for WSN deployments.
Topics No of
Unit Lectures
Page 14 of 28
Introduction and Overview of Wireless Sensor Networks: Basic Sensor
Network Architectural Elements, Advantage and challenges, Applications,
Sensor Node Technology, Sensor Taxonomy, WN Operating Environment,
Radio Technology, Network architecture, Optimization goals and figures of
merit, Design principles for WSNs, Service interfaces of WSNs, Gateway
I concepts. 15
Wireless Sensor Network Operating Systems and Ad-hoc Networks:
Overview of Wireless Sensor Network Operating Systems, Examples of
WSN Operating Systems Ad-hoc Networks in Wireless Sensor Networks,
Characteristics and Challenges of Ad-hoc Networks in WSNs, Energy
Page 15 of 28
T.Y.B.Sc. (CS) Sem VI wireless sensor network Question Bank
UNIT 1:
Answer the following:
1. What is a Wireless Sensor Network and its application? (Apr 23) (Apr 19)
2. Discuss on Issues and Challenges in Designing a Sensor Networks? (Apr 23)
3. Explain in detail various components of WSN.
4. Explain sensor taxonomy in WSNs.
5. Explain Design principles for WSNs.
6. State the reasons why gateways are needed in WSN. (Apr 23)
7. What are the different functionalities that a service interface should provide in WSN?
8. Explain Ad-hoc Network. Describe its characteristics and state the challenges faced By it
in WSN.
9. Explain various optimization goals for Wireless Sensor Networks. (Apr 19)
10. What are the characteristics of an ideal routing-protocol for Adhoc networks? (Apr 23)
11. Describe Network Architecture in WSNs.
12. What is Low- Energy Adaptive Clustering Hierarchy? State its advantages and
disadvantages.
13. In Wireless Sensor Networks, state the three types of Mobility. (Apr 23)
14. Explain about mobile adhoc network with a neat diagram? (Apr 23)
15. Explain sensor node with its different categories (Apr 19)
16. Explain the block diagram of a sensor node (Apr 19)
17. Define and explain any five tasks of transceivers (Apr 19)
18. How to turn relatively imprecise optimization goals into measurable figures of merit For
sensor node network? (Apr 23)
19. Write a short note on WSN tunnelling. (Apr 23)
20. Discuss Salient features of TinyOS. (Apr 19)
21. Discuss any 2 Mobile and wireless devices. (Apr 19)
Page 16 of 28
UNIT II:
Answer the following
Page 17 of 28
UNIT III
ANSWER THE FOLLOWING:
Page 18 of 28
Lectures
Course Code Course Title Credits /Week
About the Course: This course provides an in-depth exploration of ethical hacking and penetration
testing methodologies. Students will learn about hacking technology types, the phases of ethical hacking,
footprinting, social engineering, system hacking, web server and application vulnerabilities, wireless
hacking, and more. The course emphasizes hands-on lab exercises and real-world scenarios to develop
practical skills in identifying and mitigating security vulnerabilities.
Course Objectives:
• Understand the terminology and concepts related to ethical hacking and penetration testing.
• Explore various hacking technologies and the skills required to become an ethical hacker.
• Learn the different phases involved in ethical hacking and the methodologies used in penetration
testing.
• Gain knowledge of common hacking techniques, such as footprinting, scanning, enumeration, and
session hijacking.
• Develop proficiency in identifying and exploiting vulnerabilities in web servers, web applications,
and wireless networks.
Learning Outcomes:
After successful completion of this course, students would be able to
• Apply ethical hacking methodologies to conduct comprehensive security assessments and
penetration tests.
• Perform effective footprinting and reconnaissance techniques to gather critical information about
target systems.
• Identify and exploit vulnerabilities in various network and system components using appropriate
tools and techniques.
• Evaluate the security posture of web servers, web applications, and wireless networks, and
recommend appropriate countermeasures.
• Demonstrate an understanding of ethical and legal considerations in conducting ethical hacking
activities and adhere to professional codes of conduct.
No of
Unit Topics Lectures
Page 19 of 28
Introduction: Terminology, Hacking Technology Types, Ethical Hacking
Phases, Hacktivism, Hacker Classes, Skills Required for an Ethical Hacker,
Vulnerability Research, Ways to Conduct Ethical Hacking
Footprinting: Definition, Information Gathering Methodology, Competitive
Intelligence, DNS Enumeration, Whois and ARIN Lookups, Types of DNS
I Records, Traceroute in Footprinting, E-Mail Tracking 15
Social Engineering: Common Types Of Attacks
Scanning and Enumeration: Port Scanning, Network Scanning,
Vulnerability Scanning, CEH Scanning Methodology, Ping Sweep
Techniques, Nmap Command Switches, SYN, Stealth, XMAS, NULL,
Textbook(s):
1. CEH official Certfied Ethical Hacking Review Guide, Wiley India Edition Additional
Reference(s):
1. Certified Ethical Hacker: Michael Gregg, Pearson Education
2. Certified Ethical Hacker: Matt Walker, TMH.
Page 20 of 28
T.Y.B.Sc. (CS) Sem VI Ethical Hacking Question Bank
Unit 1
1. What is hacking also explain what are hacker classes in short.
2. Explain the types of Ethical Hacking
3. Explain Hacking Technology and its types in detail
4. What are the phases to understand Ethical Hacking explain it in detail
5. Define Hacktivism and explain ways to manifest it
6. Explain any five hacker classes
7. What are the skills required for becoming an Ethical Hacker
8. Define vulnerability research and several key
9. What are the ways to conduct Ethical Hacking
10. Define Footprinting and its types
11. Explain the methods to perform Information Gathering
12. What are the competitive Intelligence in Ethical Hacking
13. Write a short note on DNS Enumeration .
14. Explain WHOIS and ARIN Lookups in detail
15. What are the types of DNS Records in Ethical Hacking
16. What is Traceroute in Footprinting
17. Define E-mail Tracking and explain its working
18. Explain following attacks in detail
a. Key Stroke logging
b. Denial – of Service attack
c. Watering hole attack
d. Brute force attack
e. Phishing and fake WAP
OR
a. Eaves dropping attack
b. Man in the middle attack
c. Session hijacking
d. Clikjacking
e. Cookie Theft
Unit 2
1. Explain password hacking techniques.
2. List and explain different types of passwords used.
3. Explain spyware technologies in detail
4. What are the preventions used in root notes
5. What are DNS spoofing technique?
6. Explain protocol susceptible to sniffing
7. What is ARP spoofing? Explain in detail.
8. Write short note on MAC flooding
9. Explain how DNS attack works.
10. Give different techniques of common DOS attack
11. Explain Smurf attack in detail.
12. Differentiate between Bots and Botnets
13. Explain DoS/DDoS countermeasures
14. What is spoofing? Give its types.
15. What are preventive measures on hijacking.
16. What is hijacking give its types.
17. Explain the difference between spoofing and hijacking
18. Explain sniffing countermeasures.
19. What is web server explain types of attacks against web server
20. Explain patch management techniques.
21. Write steps for web server hardening.
22. What is vulnerability, explain web server vulnerabilities.
Page 22 of 28
Unit 3
1. What is web application ? Explain the vulnerabilities in web application.
2. What are the phases of web application hacking.
3. Define web application threats and its types
4. Define term :
a. Threats
b. Malware
c. Phishing
5. What is Google hacking
6. What are countermeasures to prevent web application vulnerabilities
7. Define term password hacking and what are web based cracking techniques
8. Define term authentication and its types
9. What is password cracking and name tools used in password cracking
10. Define SQL injection and name it’s types
11. Define vulnerabilities in SQL server
12. What is buffer overflow explain its types
13. Define stack based buffer overflow
14. Define term mutation in EH and explain mutation techniques
15. Explain WEP in detail
16. Write different ways to accomplish wireless hacking
17. Explain wired equivalent privacy in detail
18. Explain WPA Authentication Mechanism.
19. Explain in detail Wireless Sniffing and its working.
20. Define the term Rogue Access Point and explain its working.
21. Explain penetration testing methodology.
22. Write short note on pen test deliverables.
23. Explain automated tools used in penetration testing.
24. Explain steps to secure wireless networks.
Page 23 of 28
Lectures
Course Code Course Title Credits /Week
About the Course: The course on Cyber Laws and IPR provides a comprehensive understanding of the
legal aspects and regulations related to cyberspace and information technology. The course covers a wide
range of topics, including basic concepts, internet technology, network security, cyber law, e-commerce,
electronic signatures, cyber crimes, privacy, intellectual property rights, and more. Students will explore
the legal framework governing cyberspace and develop an understanding of the legal and ethical issues
associated with information technology.
Course Objectives:
• Understand fundamental concepts of cyber laws and their relevance in the digital age.
• Examine legal frameworks and regulations in cyber laws, including the Information Technology
Act 2000 in India.
• Explore key issues in cyber laws such as e-commerce, e-governance, and electronic records and
contracts.
• Gain knowledge of cybercrimes, enforcement mechanisms, and the role of the Cyber Appellate
Tribunal.
• Analyze emerging issues in cyber laws, including liability of ISPs, privacy concerns, and
jurisdictional aspects.
• Understand intellectual property rights and online regulations, including copyrights, patents, and
domain name disputes.
Learning Outcomes:
After successful completion of this course, students would be able to
• Demonstrate a comprehensive understanding of cyber laws and their application in the digital age.
• Evaluate legal frameworks and regulations governing cyber laws.
• Identify and assess key issues in cyber laws, such as e-commerce, e-governance, and electronic
records and contracts.
• Understand cyber crimes, enforcement mechanisms, and the role of the Cyber Appellate Tribunal.
• Analyze emerging issues in cyber laws, including liability of ISPs, privacy concerns, and
jurisdictional complexities.
• Recognize intellectual property rights and online regulations, including copyrights, patents, and
domain name disputes.
Topics No of
Unit Lectures
Page 24 of 28
Introduction to Cyber Laws and Technology: Basic Concepts, Internet and
Advantages and Disadvantages of Internet Technology, Network and
Network Security
I 15
Legal Framework and Regulations: Cyber Law & Components of Cyber
Law, Cyber Law in India: An Overview of Information Technology Act 2000,
Cryptography, Encryption Technique & Algorithm and Digital
Textbook(s):
1. Cyber Laws & Information Technology (For LL.B.) Paperback – 1 January 2020
2. Cyber Law in India, Satish Chandra, ABS Books, 2017
3. Cyber Security and Cyber Laws, Nilakshi Jain, Wiley India, October 2020 Additional
Reference(s):
1. Cyber Laws, Justice Yatindra Singh, Universal Law Publishing, Universal Publishing, 2016
2. Cyber laws, Dr. Gupta & Agrawal, PREMIER PUBLISHING COMPANY, 2022
3. Cyber Law - An Exhaustive Section Wise Commentary On The Information Technology, Pavan
Duggal, Universal Publishing (LexisNexis), 2nd Edition, 2017
Page 25 of 28
Cyber Laws & IPR
Unit 1
1. What is Virus? Explain its types.
2. Write a short note on Pegasus Spyware.
3. What is the Internet? What are its Advantages and Disadvantages?
4. Write a short note on –
a. Precautions against Malicious Computer Code
b. Worms
c. Trojans
5. Write a comprehensive note on “Evolution of the Internet”
6. Explain LAN, MAN, and WAN in detail.
7. Describe the term Network Security in detail.
8. List and Explain Network Security measures.
9. What are the various threats to network security?
10. Explain the efforts made by India to ensure cybersecurity.
11. Explain India’s National Cyber Security Policy 2013.
12. Write a short note on
a. Cyber Space.
b. Netizens.
13. What is cyber law? Explain its components.
14. Explain the component of Cyber Law in India.
15. What are the reasons for the Enactment of the Information Technology Act 2000?
16. Explain the aims and objectives of the Information Technology Act 2000.
17. Write a comprehensive note on the overview of the Information Technology Act 2000?
18. Write a short note on Digital Signature.
19. What is Cryptography? Explain Symmetric and Asymmetric Cryptography with Suitable
diagrams.
20. Differentiate between Electronic Signature and Digital signature.
21. What is E-Commerce? Explain its various models.
22. What is EDI? Explain.
23. Explain International law relating to E-Commerce.
24. What is E-Governance? Explain provisions of the Information Technology Act 2000
Related to E-Governance.
25. Explain E-Governance Projects in India.
26. What is an E-Contract? Explain the parties to be E-Contract.
27. Explain the Powers and Functions of the Controller of Certifying Authorities (CCAs).
28. Who can become the Certifying Authority under the Information Technology Act 2000?
Explain his role.
29. Explain the sections and rules of Granting of Electronic Signature Certificate.
30. Discuss the challenges to privacy in the digital age.
31. Explain the significance of the right to privacy in the context of the Internet.
Page 26 of 28
Unit 2
1. Describe the Cyber Appellate Tribunal.
2. What is Cybercrime? What are the different types of cybercrimes
3. Describe the classification of Cybercrimes.
4. What are the prevention measures for Cyber Crimes?
5. Discuss Cyber contraventions under IT ACT 2000.
6. Describe Cyber Offences under IT ACT 2000.
7. Write a note on Cyber terrorism.
8. Briefly explain the power of investigation, search and arrest mentioned under the IT ACT
2000.
9. Can an intermediary be held liable for cyber offences? Explain the law.
10. Briefly explain the Consequential amendment made in Four Acts by the IT ACT 2000.
11. Explain grey areas of the IT ACT 2000 as amended by the IT (Amendment) ACT 2008.
12. What is computer forensics? Explain different stages of Forensic investigation.
13. Write a comprehensive note on Computer forensics in India
14. Explain the Indian position regarding Cyber Jurisdiction.
15. Who is an E-Consumer? What are the functions of the Consumer Protection Act, 2019?
16. Briefly explain salient features of the Data Protection Bill, 2021 of India.
17. How do digital signatures work and what legal significance do they hold?
Unit 3
1. Briefly explain international law regarding online freedom of speech and expression.
2. Can the Intermediary be held liable when a third party uploads some information on His
website and exercise his freedom of speech and expression?
Intellectual Property Rights (IPRs), Copyrights & Patents:
3. What is an Intellectual property?
4. Write a short note on WIPO, 1996.
5. Write a short note on TRIP Agreement, 1995.
6. Explain the Berne Convention, 1886.
7. Explain WCT, 1996
8. Performance and Phonogram treaty, 1996.
9. Explain GATT and WTO.
10. Write a short note on the Universal Copyright Convention, 1952.
11. Explain Copyright terms in the Digital medium.
12. Briefly explain Copyright and Digital Music.
Page 27 of 28
13. Explain Copyright and Reverse Engineering in Computer Software: An Indian
Perspective.
14. Differentiate between Patents and Copyright.
15. What is called a Patent?
16. Briefly explain Patent Law in India.
Disputes and Resolution:
17. Explain the meaning of Trademark.
18. What are Links? What are the Do’s and Don’ts for using links?
19. Explain meta-tags issues.
20. Explain framing issues and Do’s and Don’ts for it.
21. What is Spamming? What are Anti-Spamming initiatives?
22. What is Phishing? What are Anti-Phishing initiatives?
23. Describe the impact of technology on intellectual property rights.
24. What role does technology play in the modern business environment?
25. Discuss the ethical considerations in the use of information technology.
Page 28 of 28