This type of security transforms a message or data file in such a way that its contents are hidden from unauthorized readers.

A. Authentication
B. Encryption
C. Ciphertext
D. Decryption


Answer: B

Computer Science & Information Technology

You might also like to view...

When a math expression involves an int and a double, the result will be a __________.

a. int b. decimal c. string d. double

Computer Science & Information Technology

________ is the protocol used to transfer files between computers

A) SMTP B) POP C) FTP D) TCP

Computer Science & Information Technology

A polymorphic reference variable can refer to either an object of its own class or an object of the subclasses inherited from its class.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Choose the sentence type of the following sentence.The potential employee was interviewed by a doctor, a hospital administrator, and a community leader.?

A. ?Simple B. ?Compound C. ?Complex D. ?Compound-complex

Computer Science & Information Technology