Cyber Law - Rita Is Not Sure How Exactly a Digital Signature System Works. Help Her to Understand the Process by Chossing the Most Appropriate Statement. A. a Digital Signature Is Formed Subsequent to a Message Digest

Submitted by: Submitted by

Views: 10

Words: 1194

Pages: 5

Category: Other Topics

Date Submitted: 08/19/2016 12:21 AM

Report This Essay

WE PROVIDE CASE STUDY ANSWERS, ASSIGNMENT SOLUTIONS, PROJECT REPORTS AND THESIS

aravind.banakar@gmail.com

ARAVIND - 09901366442 – 09902787224

CYBER LAW

1. Neha, a desktop publishing professional has made several authentic looking certificates

Of major indian and foreign universities and has sold these counterfeit for large sums of money to at least 3 people in india. Neha had sent these certificates as email attachments to prospective customers. Select the most appropriate answer keeping the said facts in mind:

a. neha would be punished for forgery for forging a document under the information technology act,2000

b. neha would be punished for forgery for forging a document under the indian the penal code,1860

c. neha would be punished for forgery for forging an electronic record under the indian penal code,1860

d. neha would be punished for forgery for forging an electronic record under the information Act,2000

2.With regard to jurisprudence relating to pornography, tick the most appropriate answer:

a. most jurisdictions punish dissemination of pornography, in some manner

b. all jurisdictions punish dissemination of Publishing of child pornography,

c. in some jurisdictions dissemination and possession of actual child pornography as well as dissemination of simulated computer animated images depicting child pornography is penalized.

d. some jurisdictions punish dissemination as well as possession of child pornography

3. Rita is not sure how exactly a digital signature system works. Help her to understand the process by chossing the most appropriate statement.

a. A digital signature is formed subsequent to a message digest.

b. A digital signature is formed by signing a message digest with a private key

c. A digital signature is formed by making a message interact with a one way hash been certified by a certifying authority.

d. A digital signature is verified by ausing hash function and public key...