This type of security transforms a message or data file in such a way that its contents are hidden from unauthorized readers.
A. Authentication
B. Encryption
C. Ciphertext
D. Decryption
Answer: B
Computer Science & Information Technology
You might also like to view...
When a math expression involves an int and a double, the result will be a __________.
a. int b. decimal c. string d. double
Computer Science & Information Technology
________ is the protocol used to transfer files between computers
A) SMTP B) POP C) FTP D) TCP
Computer Science & Information Technology
A polymorphic reference variable can refer to either an object of its own class or an object of the subclasses inherited from its class.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
Choose the sentence type of the following sentence.The potential employee was interviewed by a doctor, a hospital administrator, and a community leader.?
A. ?Simple B. ?Compound C. ?Complex D. ?Compound-complex
Computer Science & Information Technology