Computer Science, asked by dishasharma6391, 9 months ago

Fill in the blanks:-
1.A detected_______is often uesd to impleament the security protocols

Answers

Answered by Anonymous
36

Answer:

process

Plz mark as brainliest

Explanation:

Similar questions