Computer Science, asked by mishraaishwarya999, 5 months ago

[email protected]
Remaining Time47:15
1

2

3

4

5

6

7

8

9

10

11

12

13

14

15

16

17

18

19

20

21

22

23

24

25

26

27

28

29

30

31

32

33

34

35

36

37

38

39

40

41

42

43

44

45

46

47

48

49

50

51

52

53

54

55

56

57

58

59

60

61

62

63

64

65

66

67

68

69

70

71

72

73

74

75

76

77

78

79

80

Question 64
Match the virus type given in column-I with their corresponding examples given in column -II

Column -I column -II

A. Encrypted text i. Decryption

B. Encrypt data file and e-mail ii. Cipher text

C. To read encrypted message iii. GnuPg or GPG​

Answers

Answered by s1501viiiarakesh0201
0

gdjkhfgkhdkgdfgdhkdghdkhghskjhfkhljlhgkjh

Similar questions