Challenger App

No.1 PSC Learning App

1M+ Downloads
Any electronic signature or electronic authentication technique shall be considered reliable :

AIf the signature creation data or the authentication data are, within the context in which they are used, linked to the signatory or, as the case may be, the authenticator and of no other person

BIf the signature creation data or the authentication data were, at the time of signing, under the control of the signatory or, as the case may be, the authenticator and of no other person

CIf any alteration to the information made after its authentication by electronic signature is detectable

DAll the above

Answer:

D. All the above


Related Questions:

What are the key technological aspects of the PM-KISAN scheme's implementation?

  1. The scheme exclusively uses physical cash transfers to disburse funds.
  2. Funds are transferred directly to Aadhaar-linked beneficiary bank accounts.
  3. An Aadhaar-enabled payment system is used to ensure transparency and efficiency.
  4. The technology facilitates direct benefit transfer (DBT) to eligible farmers.
    What is a key objective of the "Supporting Digital Entrepreneurship" focus area?
    Which of the following is a popular tool for implementing e-governance at the local level?
    What are the challenges associated with setting up e-governance infrastructure?

    Identify the false statement regarding RuPay's objectives and features.

    1. RuPay aims to increase the reliance on physical cash transactions in India.
    2. The network is designed to ensure a high level of security for its users.
    3. RuPay facilitates transactions through ATMs, POS terminals, and online platforms.
    4. It represents India's own domestic card payment network.