Request New Subject
Home
Computer Science Engineering (CSE)
Information Cyber Security (ICS)
Q. Misuse of digital signatures for fraudulent purposes comes under __________ of IT Act. (Solved)
1. section 65
2. section 66
3. section 71
4. section 72
d. section 72
Related Topics
→ Computer Architecture and Organization
→ Microprocessor and Interfacing Technique
→ Computer Networks
→ Data Structure and Algorithms (DSA)
→ Operating System (OS)
→ Artificial Intelligence and Robotics (AIR)
→ Software Project Management (SPM)
→ Computer Fundamentals
→ High Performance Computing (HPC)
→ Data Communication and Computer Network
Subscribe Now
Get All Updates & News
Subscribe