Communicating Audit Results - ICT Policy 2009
40 Questions
0 Views

Communicating Audit Results - ICT Policy 2009

Created by
@CalmAllegory

Questions and Answers

What is the primary structure of the National ICT Policy?

  • A circular flowchart illustrating the policy process
  • A list of objectives without any strategic themes
  • A hierarchical pyramid with a defined vision and objectives (correct)
  • A flat document with no specific structure
  • How frequently should the National ICT Policy be reviewed in totality?

  • Every five years
  • Every year
  • Every three years
  • Every six years (correct)
  • What is the role of the Minister in charge of ICT in relation to the National ICT Policy?

  • To create new strategic themes for the policy
  • To monitor and coordinate the ICT Policy (correct)
  • To oversee international relations regarding ICT
  • To implement all action items directly
  • What is the maximum timeframe for action items classified as long-term in the National ICT Policy?

    <p>10 years</p> Signup and view all the answers

    Which of the following represents the correct sequence for reviewing strategic themes?

    <p>Every three years</p> Signup and view all the answers

    What is a characteristic of the action items specified in the National ICT Policy?

    <p>They have specific implementation timeframes</p> Signup and view all the answers

    Who is expected to champion the National ICT Policy within the government?

    <p>A champion at the highest levels of government</p> Signup and view all the answers

    What distinguishes strategic themes from action items in the National ICT Policy?

    <p>Strategic themes are broad areas, while action items are specific tasks</p> Signup and view all the answers

    What is the maximum punishment for hiding or changing computer source code for the first time?

    <p>Imprisonment for 3 years or fine of 3 lacs taka</p> Signup and view all the answers

    What type of offense does continuously committing acts against the national symbols lead to?

    <p>Life term imprisonment with a fine up to 3 crores</p> Signup and view all the answers

    Which of the following is NOT considered an offense under the provisions discussed?

    <p>Correctly coding software for personal use</p> Signup and view all the answers

    What is the penalty for digital or electronic forgery according to the provisions?

    <p>Imprisonment as per the discretion of the court</p> Signup and view all the answers

    If a person is convicted for a second offense related to computer source code change, what is the maximum penalty?

    <p>Imprisonment for 5 years or fine of 5 lacs taka</p> Signup and view all the answers

    What is the maximum imprisonment term for a first-time hacking offence?

    <p>14 years</p> Signup and view all the answers

    Which of the following actions related to the liberation war is punishable under the Act?

    <p>Running propaganda against the liberation war</p> Signup and view all the answers

    What is the fine for a first-time offender of hacking?

    <p>Tk. 1 Crore</p> Signup and view all the answers

    For which of the following could a person face imprisonment for up to 10 years?

    <p>Running a campaign against national symbols</p> Signup and view all the answers

    What is the maximum fine imposed for a first offense against the national flag?

    <p>1 crore taka</p> Signup and view all the answers

    What is the penalty for someone who repeatedly commits a hacking offence?

    <p>Life imprisonment</p> Signup and view all the answers

    In the case of aiding an offence under this Act, what is the consequence?

    <p>Same punishment as the original offence</p> Signup and view all the answers

    Who can be held accountable if a company commits an offence under this Act?

    <p>All direct connections to the offence</p> Signup and view all the answers

    What is the fine for a company found guilty of an offence under this Act?

    <p>Only monetary punishment is applicable</p> Signup and view all the answers

    What must a company representative prove to avoid penalties for an offence?

    <p>The offence was unknown to them</p> Signup and view all the answers

    Which of the following statements about 'Hacking' is NOT true?

    <p>It is only related to personal computers</p> Signup and view all the answers

    What is the primary function of Online Analytical Processing (OLAP)?

    <p>To analyze complex relationships among large amounts of data</p> Signup and view all the answers

    Which of the following describes the process of 'drill-down' in OLAP?

    <p>Displaying detailed information that makes up consolidated data</p> Signup and view all the answers

    What is meant by 'slicing and dicing' in the context of OLAP?

    <p>Looking at the database from different viewpoints</p> Signup and view all the answers

    Which statement accurately reflects the benefits of Push Reporting?

    <p>It frees managers from waiting for scheduled reports by delivering information directly.</p> Signup and view all the answers

    What does consolidation in OLAP involve?

    <p>Rolling up data for an overview, often combining interrelated data</p> Signup and view all the answers

    Which of the following is NOT a typical operation performed in OLAP?

    <p>Time-series forecasting</p> Signup and view all the answers

    What kind of tasks are facilitated by using webcasting software for reporting?

    <p>Broadcasting reports to the PCs of managers and specialists</p> Signup and view all the answers

    During an OLAP session, what characteristic is emphasized in terms of data interaction?

    <p>Real-time responses to queries</p> Signup and view all the answers

    What is the maximum punishment for repeated defamation offences according to the outlined penalties?

    <p>5 years imprisonment or Tk. 10 lac fine</p> Signup and view all the answers

    Which of the following is considered an offence regarding e-transactions?

    <p>E-transactions through unauthorized digital mediums</p> Signup and view all the answers

    What type of punishment is imposed for the first offence of e-transaction without legal authority?

    <p>Maximum 5 years imprisonment or Tk. 5 lac fine</p> Signup and view all the answers

    How long is the imprisonment term for someone committing a defamation offence for the second time?

    <p>5 years</p> Signup and view all the answers

    What is defined as 'E-Transaction' under the provided information?

    <p>Deposit or withdrawal of funds through legal means</p> Signup and view all the answers

    What happens if a person commits an electronic transaction offence for the second time?

    <p>7 years imprisonment or Tk. 10 lac fine</p> Signup and view all the answers

    What is the maximum fine for someone found guilty of e-transaction without legal authority on the first offence?

    <p>Tk. 5 lac</p> Signup and view all the answers

    What is the penalty for someone publishing defamatory information for the first time?

    <p>Imprisonment not exceeding 3 years or a fine of Tk. 5 lac</p> Signup and view all the answers

    Study Notes

    National ICT Policy 2009

    • Document structured as a hierarchical pyramid with a single vision, 10 broad objectives, 56 strategic themes, and 306 action items.
    • Vision and objectives align with national goals; strategic themes identify ICT benefit areas within broad objectives.
    • Action items categorized for implementation as short-term (18 months or less), medium-term (5 years or less), and long-term (10 years or less).
    • Definitions for terms such as Vision, Objective, Strategic Theme, Action Item, and ICTs provided for clarity.

    Policy Ownership, Monitoring and Review

    • Stakeholder ownership essential for adherence to the ICT Policy across national spheres.
    • Minister in charge of ICT to monitor and coordinate the National ICT Policy.
    • Implementation supported by the Bangladesh Computer Council and all government agencies.
    • Annual reviews of action plans for implementation status; strategic themes reviewed every three years.
    • Total policy reviews every six years to adjust long-term goals based on achievements and failures.
    • Computer Source Code Offenses

      • Intentionally changing, hiding, or destroying source code is punishable by up to 3 years imprisonment or a fine of up to 300,000 taka.
      • Repeated offenses may incur imprisonment up to 5 years and a fine up to 500,000 taka.
    • Propaganda Against National Entities

      • Digital propaganda against the liberation war, Father of the Nation, or national symbols incurs penalties of up to 10 years imprisonment or fines up to 1 crore taka.
      • Repeat offenses can lead to life imprisonment or fines up to 3 crores taka.
    • Digital or Electronic Forgery

      • Committing forgery using digital means is punishable by up to 10 years imprisonment or fines up to 2 million taka for repeat offenders.
    • Defamation in Electronic Media

      • Publication or broadcast of defamatory information can result in up to 3 years imprisonment or fines up to 500,000 taka, with harsher penalties for repeat offenses.
    • Unauthorized E-Transactions

      • Conducting illegal e-transactions may result in up to 5 years imprisonment or fines up to 500,000 taka; repeat offenses increase punishment to 7 years and fines up to 1 million taka.
    • Hacking Offenses

      • Hacking defined as unauthorized access or altering data incurs penalties up to 14 years imprisonment or fines up to 1 crore taka for first-time offenders.
      • Repeat offenses can lead to life imprisonment or fines up to 5 crores.
    • Aiding in the Commission of Offenses

      • Individuals aiding in offenses face the same penalties as offenders.

    Corporate Responsibility

    • Owners and executives of companies implicated in ICT violations may be held liable unless they prove lack of knowledge or efforts to prevent the offense.
    • Companies can face monetary penalties alongside individual accountability.

    Online Analytical Processing (OLAP)

    • OLAP allows managers and analysts to interactively analyze large datasets and relationships from multiple perspectives.
    • Key operations include:
      • Consolidation: Aggregating data for broader perspectives.
      • Drill-down: Accessing detailed data from consolidated information.
      • Slicing and Dicing: Analyzing data from various viewpoints, often along a time axis to detect trends.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Description

    This quiz covers key aspects of the National ICT Policy 2009 as outlined in Chapter 1. Test your understanding of the structure, objectives, and action items of the policy document. Gain insights into how these policies contribute to national goals.

    More Quizzes Like This

    ICT Policy Overview
    40 questions

    ICT Policy Overview

    BalancedPersonification avatar
    BalancedPersonification
    ICT Impact on Business Systems
    40 questions

    ICT Impact on Business Systems

    WellEducatedMannerism avatar
    WellEducatedMannerism
    Use Quizgecko on...
    Browser
    Browser