Question
Consider the following statements regarding digital
signatures under the IT Act, 2000: 1. A digital signature uses an asymmetric crypto system. 2. A digital signature must involve a hash function. 3. The private key and public key together constitute a key pair unique to the subscriber. Which of the statements given above are correct?Solution
Section 3 of the IT Act defines digital signatures as authentication using an asymmetric cryptosystem and a hash function. Asymmetric cryptography necessarily involves a mathematically linked public key and private key, collectively known as a key pair, which is unique to the subscriber. The hash function ensures integrity of the electronic record by converting data into a fixed-length hash value. Since all three statements accurately describe statutory and technical elements of a digital signature, option D is correct.
Which of the following is a duty of a holder of forest right as per the Scheduled Tribes and other Traditional Forest Dwellers Recognition of Forest Rig...
A person shall not be guilty of contempt of court for ________________ as laid down under the Contempt of Court Act
In Dinesh Trivedi vs. Union of India (1997) 4 SCC 306. Supreme Court
Recognized _____.
Which of the following can qualify as a mediation service provider?
“The Commission may call for reports, returns and statements from the Central Government or corporations established by any Central Act.”
Thi...
Two or more persons are said to consent_______________
Precept is issued to________.
The burden of proof that the case of accused comes within exception is on the
______________may have one director elected by such small shareholders in such manner and with such terms and conditions as may be prescribed
According to Sale of Goods Act, 1930