Answer to Question #228311 in Law for Saifi

Question #228311
What is E-Governance? How does IT act ,2000 facilitate e-governance?
(b) What is meant by Digital Signature? State the procedure of creation and verification
(c) Define : (i) Hash function (ii) Computer network and computer virus.
(d) What are the duties of a Subscriber under IT Act?
1
Expert's answer
2021-08-24T13:24:02-0400

a)     Electronic governance or e-governance can be defined as the usage of Information and Communication Technology (ICT) by the government to provide and facilitate government services, exchange of information, communication transactions and integration of various standalone systems and services. Through e-governance, government services are made available to citizens in a convenient, efficient, and transparent manner. The three main target groups that can be distinguished in governance concepts are government, citizens, and businesses/interest groups.

The IT Act, 2000 empowers the Central Government to prescribe the following; Type of digital signature. Also, the manner and format of affixing the digital signature. Procedures which facilitate the identification of the person affixing the digital signature.

b)     A digital signature is a mathematical technique used to validate the authenticity and integrity of a message, software or digital document. The following procedure is involved in creation and verification of digital signature;

Step 1: On clicking the link, the document should open in an electronic signature tool.

Step 2: The user will be asked to agree to electronic signing. After the user confirms agreement, he or she would be required to follow certain instructions to start or sign.

Step 3: On clicking each tag and adhering to the instructions, the user can add the digital signature.

Step 4: The final and important step is to verify one’s identity and follow the instructions to add the digital signature.

c)     A hash function is a function that takes a set of inputs of any arbitrary size and fits them into a table or other data structure that contains fixed-size elements

Computer network, two or more computers that are connected with one another for the purpose of communicating data electronically. A computer virus is a malicious software program loaded onto a user’s computer without the user’s knowledge and performs malicious actions.

d)     Every subscriber shall exercise reasonable care to retain control of the private key corresponding to the public key listed in his Digital Signature Certificate and take all steps to prevent its disclosure.


Need a fast expert's response?

Submit order

and get a quick answer at the best price

for any assignment or question with DETAILED EXPLANATIONS!

Comments

No comments. Be the first!

Leave a comment

LATEST TUTORIALS
New on Blog
APPROVED BY CLIENTS