Computer Science, asked by sujitsingh4922, 11 months ago

The method of access which uses key transformation

Answers

Answered by prabh6013
1

your answer is hash

hope your answer will be correct

Similar questions