M
Q. ……………….. techniques make use of secret codes (or) keys to encrypt information
Correct Answer - Option(A)
Be the first to start discuss.
Related Posts
Q. Digital signature acts as a ……………….. for e commerce
Q. 20north .com, flipkart.com. are an example for
Q. …………………… is a new architecture if or the development of loosely coupled distributed application
Q. The structure of a web page is called it’s
Q. The advt which float over the page for 5 to 30 sec is
Q. A web page is created using
Q. This is a form of advt. on the web that appears between web pages that the user requests
Q. Gain entry into the user’s system and scan your file system for personal information is known as
Q. Which among these is a cheap alternative method to traditional printed catalogues
Discusssion
Login to discuss.