M
Q. ……………….. techniques make use of secret codes (or) keys to encrypt information
- Correct Answer - Option(A)
- Views: 74
- Filed under category E-Commerce Management
Share
No solution found for this question.
Add Solution and get +2 points.
You must be Logged in to update hint/solution
Loading comments.....
Related Posts
Q. Digital signature acts as a ……………….. for e commerce
Q. Supply chain execution is the process of putting supply chain planning in to …………….
Q. The attacker monitors the data between the shoppers computer and the server
Q. ……………… is a client server based internet standards or set of rules
Q. Which is a web- roaming program used to find documents pertaining to your search
View All Posts
Question analytics

Discusssion
Login to discuss.