protocol protects the integrity of the data using encryption and
The
cryptographic hash function techniques.
a. Security File Transfer
b. System File Transfer
c. Secure File Transfer
d. None of these
India in an initiative launched by the government of India on
Answers
Answered by
1
Answer:
b system file transfer
Answered by
0
Explanation:
- फाइंड द वैल्यू ऑफ एक्स क्यूब माइनस 3 एक्स प्लस अंडर रूट 5 बाय एक्स इक्वल टू माइनस 3
Similar questions