- Trending Categories
Data Structure
Networking
RDBMS
Operating System
Java
MS Excel
iOS
HTML
CSS
Android
Python
C Programming
C++
C#
MongoDB
MySQL
Javascript
PHP
Physics
Chemistry
Biology
Mathematics
English
Economics
Psychology
Social Studies
Fashion Studies
Legal Studies
- Selected Reading
- UPSC IAS Exams Notes
- Developer's Best Practices
- Questions and Answers
- Effective Resume Writing
- HR Interview Questions
- Computer Glossary
- Who is Who
Mukesh Kumar has Published 2035 Articles
![Mukesh Kumar](https://www.tutorialspoint.com/assets/profiles/539476/profile/60_1801695-1666249362.jpg)
Mukesh Kumar
881 Views
The second-highest constitutional position in India is that of the vice president. The vice president does have some significant executive authority. The nomination of senior officials and the execution of oaths of office are the main responsibilities of these powers. There must be a Vice-President of India, according to ... Read More
![Mukesh Kumar](https://www.tutorialspoint.com/assets/profiles/539476/profile/60_1801695-1666249362.jpg)
Mukesh Kumar
101 Views
A broad word, "emotional distress, " can be used to describe a wide range of symptoms from numerous mental health conditions. Nonetheless, even if a person does not fulfil the criteria for a psychiatric disorder, they can still feel emotional pain. Symptoms and experiences of a person's inner life that ... Read More
![Mukesh Kumar](https://www.tutorialspoint.com/assets/profiles/539476/profile/60_1801695-1666249362.jpg)
Mukesh Kumar
155 Views
The First Babylonian Dynasty's King Hammurabi was the sixth monarch. His law not only served to make amends to the wronged parties, but also to punish the offenders. It bears the oldest use of the legal maxim "innocent unless proven guilty." The traces of King Hammurabi can still be found ... Read More
![Mukesh Kumar](https://www.tutorialspoint.com/assets/profiles/539476/profile/60_1801695-1666249362.jpg)
Mukesh Kumar
202 Views
The protection of the claimant's economic interests is the main objective of ECONOMIC TORTS, as their name suggests. These torts include dishonesty, malicious falsehood, intimidation, simple conspiracy, unlawful conspiracy, causing the breach of contract, and unlawful trade interference. These are all intentional torts. They also ... Read More
![Mukesh Kumar](https://www.tutorialspoint.com/assets/profiles/539476/profile/60_1801695-1666249362.jpg)
Mukesh Kumar
92 Views
Most people have paid taxes at some point in their lives, whether they were income taxes, sales taxes, or a combination of both. Only a select few, however, have paid tariffs out of their own pockets. Those in the know frequently use the terms tax and tariff interchangeably. But they ... Read More
![Mukesh Kumar](https://www.tutorialspoint.com/assets/profiles/539476/profile/60_1801695-1666249362.jpg)
Mukesh Kumar
16K+ Views
The three lists in Schedule VII of the Indian Constitution define the limits of the Centre's and States' legislative authority. Tax and fee-levying authority do not overlap, and the terms "fee" and "tax" have been given various interpretations. To distinguish fees from tax, the Hon. Supreme Court has carved ... Read More
![Mukesh Kumar](https://www.tutorialspoint.com/assets/profiles/539476/profile/60_1801695-1666249362.jpg)
Mukesh Kumar
132 Views
Reputation is viewed as a person's private property. It is more valuable than any other type of asset. A person's reputation is effectively hurt when they are defamed. Similar to interfering with property, someone who damages another's reputation does so at their own peril. Defamation is described as "the offence ... Read More
![Mukesh Kumar](https://www.tutorialspoint.com/assets/profiles/539476/profile/60_1801695-1666249362.jpg)
Mukesh Kumar
597 Views
Cyberstalking does not always include face-to-face contact, and some victims may not even be aware that they are being followed online. Numerous techniques can be employed to keep tabs on the victims, and the data acquired may then be utilised to commit crimes like identity theft. Some stalkers even contact ... Read More
![Mukesh Kumar](https://www.tutorialspoint.com/assets/profiles/539476/profile/60_1801695-1666249362.jpg)
Mukesh Kumar
1K+ Views
As more and more internet users surf the internet and post their personal information; in the form of educational qualification, marital status, private selfies, videos, family photos, hobbies and interests, online on social media networking websites are easily accessible to the general public. This led to the scam of loss ... Read More
![Mukesh Kumar](https://www.tutorialspoint.com/assets/profiles/539476/profile/60_1801695-1666249362.jpg)
Mukesh Kumar
243 Views
The concept of cyber terrorism has persisted for more than 20 years. Many scholars have advanced the cause over the years by looking into, among other things, whether cyber terrorism is a genuine or imagined threat, which actors can engage in it, what the potential reasons for such an act ... Read More