M
Q. Misuse of digital signatures for fraudulent purposes comes under __________ of IT Act.
No solution found for this question.
Add Solution and get +2 points.
You must be Logged in to update hint/solution
Be the first to start discuss.
Related MCQs
Q. What’s the best Access object for an invoice you’ll mail to customers?
Q. The root node in the file system is write as
Q. An operational system is _____________.
Q. Recursive approach to find power of a number is preferred over iterative approach.
Q. The ICT systems are called as when system view is as single system
Q. The spatial aspect of the locality of reference means ________
Question analytics

Discusssion
Login to discuss.