Software piracy refers to the unauthorized copying, distribution, or use of software. It is a violation of intellectual property rights (IPR) and is treated as […]
Author: Durga Medida
29. Duties of Subscribers.
A subscriber is a person in whose name the Digital Signature Certificate (DSC) is issued. The IT Act, 2000 places certain legal responsibilities on subscribers […]
31. Electronic Record
Definition under IT Act, 2000 According to Section 2(1)(t) of the Information Technology Act, 2000, an electronic record means: “Data, record or data generated, image […]
32. Cyber Security
Cyber Security refers to the practice of protecting computers, servers, mobile devices, networks, and data from unauthorized access, cyber attacks, damage, or theft. It encompasses […]
33. Phishing
Phishing is a type of cybercrime where attackers impersonate a legitimate person, brand, or organization to trick individuals into revealing sensitive information such as: The […]
34. Electronic Signature
An Electronic Signature (e-signature) is a digital method of signing documents or authenticating records electronically, rather than using a handwritten signature on paper. According to […]
36. Search Engines
Definition: A search engine is a web-based software system designed to search for information on the internet. It retrieves data based on keywords or phrases […]
37. Kinds of Operating System
Kinds of Operating SystemsAn operating system (OS) is system software that manages computer hardware and software resources. There are several types of operating systems, each […]
38. Hacking
Definition: Hacking is the act of unauthorized access to or control over a computer system, network, or digital data, usually with the intent to steal, […]
41. Domain name
Definition: A domain name is the unique, human-readable address of a website on the internet. It is used to identify and locate computers (like web […]
