Which of the following are correct in context of network security? A. Virus, worms, and Tr...
Match the LIST-I with LIST-II LIST-I (Recognition System) A. MICR B. OCR C. OMR D. Barcode...