Computer Science, asked by sujitsingh4922, 1 year ago

The method of access which uses key transformation

Answers

Answered by prabh6013
1

your answer is hash

hope your answer will be correct

Similar questions