TARUN BHURAM
Nidhi Solanki
Sameer Sharma
Direct memory access
Deadlock in operating system
Constrains in service design
What is software piracy
What is CIA model with respect to INFOSEC ?
What are different colours for navratri? Why people follow the colour code ?
|
Muhammad Saalim
-