Which of the following functions provides an output which cannot be reversed and converts data into a string of characters?
A. Hashing
B. Stream ciphers
C. Steganography
D. Block ciphers
Ans: A. Hashing
You might also like to view...
A hacker is a person who uses computer expertise to gain access to computer systems without permission
Indicate whether the statement is true or false
If your computer is ________ messages are stored in the Outbox.
a. offline b. wired c. online d. connected
A ____ is a large screen computer either built into a table or designed to be used on a table that allows multi-touch input from multiple users.
A. tactile feedback screen B. table PC C. digitizing tablet D. touch coding system
Here is a list of file names with extensions. Pick at least one that could properly be the implementation file and at least one that can properly serve as interface file.
a. File.cxx b. File.hxx c. File.cc d. File.h e. File.cpp f. File.hpp