Published:   30-Nov--0001

(a) Public key cryptography
(b) Private key cryptography
(c) Hash function
(d) Trustless verification
Answer: Trustless verification
| Subject : Technology | Chpater : Cryptography
Posted By :   Article Writer |

Info:




More MCQ Question

Blog Post

    Search By Subject
    Search By Location
  • Land Bangladesh