1.____________ is a user who accesses a computer in an unauthorized network.
2. Fingerprints or voice matching technologies are called ______
3. __________ Is used in defense department and internet banking
i mark as BRAINLIST
computer
hvgp:
yes
Answers
Answered by
1
Hi,
1. Hacker
2. Artificial Intelligence
3. encryption
hope it will help you.
Answered by
0
hacker
biometric attributes
fire wall
right hai
brainlist add
biometric attributes
fire wall
right hai
brainlist add
Similar questions