M
Q. ……………….. techniques make use of secret codes (or) keys to encrypt information
- Correct Answer - Option(A)
- Views: 75
- Filed under category E-Commerce Management
No solution found for this question.
Add Solution and get +2 points.
You must be Logged in to update hint/solution
Be the first to start discuss.
Related Posts
Q. ……….. refers to supply of goods and services for online govt. procurement
Q. The most commonly used protocols are
Q. The user reaches this page when they specify the address of a web site.
Q. This type of card includes an embedded ICC
Q. Which are used for signing and endorsing electronic changes
Q. There are two main concerns for using digital coins: anonymity of the consumer and :-
Q. TV Viewer can interact with what is happening on screens using their mobile phone is
Q. Which is defined as a financial exchange that takes place on line between buyers and sellers
View All Posts
Question analytics

Discusssion
Login to discuss.