Challenger App

No.1 PSC Learning App

1M+ Downloads
Any electronic signature or electronic authentication technique shall be considered reliable :

AIf the signature creation data or the authentication data are, within the context in which they are used, linked to the signatory or, as the case may be, the authenticator and of no other person

BIf the signature creation data or the authentication data were, at the time of signing, under the control of the signatory or, as the case may be, the authenticator and of no other person

CIf any alteration to the information made after its authentication by electronic signature is detectable

DAll the above

Answer:

D. All the above


Related Questions:

The Department of Information Technology aimed to facilitate

Which of the following correctly identifies a way e-governance promotes democratic practices?

  1. Encouraging public participation and consultation in government decisions.
  2. Discouraging citizens from voicing their opinions to the government.
  3. Reducing the availability of information relevant to public discourse.
  4. Limiting the influence of citizens on government policy.
    What does the Digital India initiative primarily promote in the area of innovation?

    What are the key functionalities offered by the LokOS mobile application?

    1. It allows administrators to create and approve new Community-Based Organizations (CBOs).
    2. Users can quickly record CBO activities such as meetings and member registrations.
    3. It facilitates the recording of financial transactions like savings, lending, and repayments.
    4. The mobile app is primarily used for generating annual audit reports.
      What is a key benefit for artisans using the India Handmade platform?