How can data be protected while it is being transmitted?

A. It can be encrypted using a cryptographic system
B. It can be hashed using a cryptographic system.
C. It can be encrypted using a hashing system.
D. It can be hashed using a hashing system.


A. It can be encrypted using a cryptographic system

Computer Science & Information Technology

You might also like to view...

In the Relationship window, a one-to-many relationship is indicated by the 1 and ________ symbol(s)

A) ++ B) >> C) ? D) ?

Computer Science & Information Technology

Case 5-1 The world of the Internet can be overwhelming. It takes time to understand the community and its players. For each of the following questions, look at the organizations, businesses, or individuals listed, and then determine what they represent as a whole. A musician who posts a music video on YouTube and a photographer who posts photos on a Web site are examples of _____.

A. ?Internet service providers B. ?key Internet dealers C. ?Internet content providers D. ?matrix suppliers

Computer Science & Information Technology

Which of the following is NOT a conditional formatting option?

A. Color Scales B. Icon Sets C. Sparklines D. Data Bars

Computer Science & Information Technology

Because there is a one-to-many relationship between sales reps and customers in the Premiere Products database, one sales rep can be associated with zero, one, or more customers.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology