Computer Science, asked by shivarora68388, 8 months ago

protocol protects the integrity of the data using encryption and
The
cryptographic hash function techniques.
a. Security File Transfer
b. System File Transfer
c. Secure File Transfer
d. None of these
India in an initiative launched by the government of India on​

Answers

Answered by moxit84
1

Answer:

b system file transfer

Answered by babakyser90
0

Explanation:

  • फाइंड द वैल्यू ऑफ एक्स क्यूब माइनस 3 एक्स प्लस अंडर रूट 5 बाय एक्स इक्वल टू माइनस 3
Similar questions