__________ is the process of converting an original message into a form that is unreadable to unauthorized individuals.

A. Encryption
B. Decryption
C. Cryptology
D. Cryptography


Answer: A

Computer Science & Information Technology

You might also like to view...

One-dimensional array p contains four elements. The names of those elements are _______, ___________, _____________, and ___________.

What will be an ideal response?

Computer Science & Information Technology

When you use borders to create vertical lines between columns, apply the borders to the left and right sides of the shortest columns in the layout.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

In C++, the ____ symbol is called the assignment operator.

a. -> b. >> c. == d. =

Computer Science & Information Technology

A function that searches through a range for a specific value and returns the relative position of that value within the range.

What will be an ideal response?

Computer Science & Information Technology