App Logo

No.1 PSC Learning App

1M+ Downloads
Any electronic signature or electronic authentication technique shall be considered reliable :

AIf the signature creation data or the authentication data are, within the context in which they are used, linked to the signatory or, as the case may be, the authenticator and of no other person

BIf the signature creation data or the authentication data were, at the time of signing, under the control of the signatory or, as the case may be, the authenticator and of no other person

CIf any alteration to the information made after its authentication by electronic signature is detectable

DAll the above

Answer:

D. All the above


Related Questions:

How does MyGov leverage technology to maximize citizen participation?

  1. MyGov employs a variety of tools and methodologies, including online discussions, tasks, quizzes, and public pledges.
  2. It relies solely on mobile apps for citizen interaction.
  3. The platform uses Interactive Voice Response Systems (IVRS), SMS, and Outbound Dialing (OBD) to reach individuals, particularly in rural areas with limited internet access.
  4. Technological integration on MyGov is limited to online platforms.

    Identify the core functions performed by the State Data Centre (SDC).

    1. Ensuring data protection and facilitating online service delivery.
    2. Acting as a gateway for citizens to access government services and providing disaster recovery capabilities.
    3. Managing physical security of government buildings.
    4. Developing new government policies and legislation.
      The "Capacity Building and Skill Development" initiative aims to create a talent pool to support India's digital transformation. What is the primary focus of these initiatives?

      What is the primary role of the Aadhaar number in a DigiLocker account?

      1. It serves as the primary authentication for creating and accessing the account.
      2. It is used as the main document for all official verification.
      3. It is a mandatory requirement for every document stored in the locker.
        Access to a patient's health data via the ABHA number requires: