Start learning 50% faster. Sign in now
Get Started with ixamBee
Start learning 50% faster. Sign in nowThe RBI's draft circular aims to enhance digital-payment security by proposing an additional authentication factor that must be robust, dynamically created, and used only once. However, it exempts certain transactions, such as contactless card transactions below ₹5,000 and insurance premiums, from this requirement. The proposal also emphasizes the need for customer consent and outlines due diligence procedures for Aadhar-enabled Payment System (AePS) touchpoint operators, ensuring ongoing compliance with existing regulations.
The ‘brain’ of a computer which keeps peripherals under its control is called :
Which of the following is a computer virus?
Codes consisting of bars or lines of varying widths or lengths that are computer-readable are known as—
Which among the following statements is incorrect?
Which component on a motherboard is responsible for managing the flow of data between the CPU, RAM, and other hardware components?
A collection of related files is called a______.
___________ is a passage to connect two networks that may work on different networking models.
Officer LANs that are spread geographically apart on large scale can be connected using a corporate
What is a file system in an operating system?
Which of the following are the features of primary memory of the computer?