________ is the use of mathematical operations to protect messages travelling between parties or stored on a computer
A) Cryptography
B) Encryption
C) Authentication
D) Confidentiality
Answer: A
You might also like to view...
Which of the following is an assumption of the aggregate demand-aggregate supply model?
A. Capital stock cannot be varied in the short run. B. An economy is always at full-employment level in the short run. C. Producers are reluctant to change prices of their products even in the long run. D. Long-run aggregate supply curve slopes upward.
What task can the accounts receivable department engage in to verify that all checks sent by customers have been appropriately deposited and recorded?
Bonds that give the issuing corporation the option of calling the bonds for redemption before the maturity date are called:
a. coupon bonds. b. callable bonds. c. convertible bonds. d. debenture bonds. e. registered bonds.
How did the information about Gadams's employment and letters of recommendation become known?
a. The guardian of a Livingston student filed suit against the school b. Parents disclosed the information c. The issues with Gadams were on file with his teaching certification d. None of the above