COMPUTER FUNDAMENTALS

COMPUTER ETHICS AND SECURITY

ETHICS IN COMPUTING

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
The Act aims to provide security protection to online transactions. . It only legalizes on one technology namely private key-public key Cryptography (PKP). Above is TRUE about
A
Communication and Multimedia Act 1998
B
Copyright (Amendment) Act 1997
C
Computer Crimes Act 1997
D
Digital Signature Act 1997
Explanation: 

Detailed explanation-1: -Share to Facebook Share to Twitter. Definition(s): A cryptographic key that is used with an asymmetric (public key) cryptographic algorithm and is associated with a public key. The private key is uniquely associated with the owner and is not made public.

Detailed explanation-2: -Public and private keys In cryptography, a key is a value used with an algorithm to encrypt and/or decrypt data. A private key, also known as a secret key, is kept on its owner’s system and never transmitted publicly. A public key, as the name implies, is openly available to anyone who wants it.

Detailed explanation-3: -2 under Public-key certificate. A digital document issued and digitally signed by the private key of a certificate authority that binds an identifier to a subscriber to a public key. The certificate indicates that the subscriber identified in the certificate has sole control and access to the private key.

There is 1 question to complete.