Computer Science, asked by hvgp, 1 year ago

1.____________ is a user who accesses a computer in an unauthorized network.

2. Fingerprints or voice matching technologies are called ______

3. __________ Is used in defense department and internet banking

i mark as BRAINLIST
computer


hvgp: yes
hvgp: book author
hvgp: name
hvgp: chandrika jsini
hvgp: vedam
hvgp: sorry jaini

Answers

Answered by Anonymous
1

Hi,


1. Hacker

2. Artificial Intelligence

3. encryption


hope it will help you.




hvgp: no encryption 3 number
hvgp: book ma
hvgp: hai
hvgp: ok
adityasheetal: wrong 2 3
Answered by adityasheetal
0
hacker
biometric attributes
fire wall

right hai
brainlist add
Similar questions