Question
Which one of the following protocol is used for secure
communication over a computer network?Solution
The correct answer is A
What type of E-commerce model assists people to instantly share related computer files and computer sources without having to interact with central web ...
Dividing the disk into Tracks and Sectors is known as ________
3rd Generation computer -
Which among the following is a volatile memory?
A set trigger, such as a preprogrammed date or time, activates which type of threat?
Digital computer deals with ____?
___________ in case of memory, represent the Global volume of information in bits that the memory can Store.
Which of the following is considered as latest browser?
Which is called brain of computer?
The smallest resolvable part of the screen is ____Â