Encryption is used to

a. code your e-mail so only one person can decipher it.
b. shrink the amount of space it takes to store e-mail.
c. transfer e-mail more quickly.
d. make shopping on the Internet more available.


A

Computer Science & Information Technology

You might also like to view...

With a Class C IP address, the last octet is considered the host portion of the IP address

Indicate whether the statement is true or false

Computer Science & Information Technology

Explain two alternative strategies for organizing cables in the patch panel, relative to the actual network.

What will be an ideal response?

Computer Science & Information Technology

The current version of the Border Gateway Protocol is ____________________.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

#include is an example of a(n)

A) comment. B) I/O statement. C) preprocessor directive. D) stream directive. E) compiler option.

Computer Science & Information Technology