Question
Which of the following BEST describes “cyber
terrorism” under the IT Act, 2000?Solution
Section 66F defines cyber terrorism as acts committed using computer resources with intent to threaten the unity, integrity, security or sovereignty of India or to strike terror in people. Ordinary hacking or obscene publication does not amount to cyber terrorism. Hence, option C is correct.Â
Which of the following is a maintainer line?
Groundnut aphid (Aphis craccivora) apart from ground nut it is a serious pest of
Which among the following propagation method is used in droopy/viney?
Terrestrial radiation is measured by:
Fat soluble vitamins include:
Basin lister is a tillage implement used for
The enzyme which is involved in the softening of the fruit texture during ripening is
Maximum solar energy is trapped by
______is a form of temporarily increased resistance resulting from some conditions of plant or its environment.
For hybrid seed production_______ flowers are completely suppressed on female plants.