Which of the following functions provides an output which cannot be reversed and converts data into a string of characters?

A. Hashing
B. Stream ciphers
C. Steganography
D. Block ciphers


Ans: A. Hashing

Computer Science & Information Technology

You might also like to view...

A hacker is a person who uses computer expertise to gain access to computer systems without permission

Indicate whether the statement is true or false

Computer Science & Information Technology

If your computer is ________ messages are stored in the Outbox.

a. offline b. wired c. online d. connected

Computer Science & Information Technology

A ____ is a large screen computer either built into a table or designed to be used on a table that allows multi-touch input from multiple users.

A. tactile feedback screen B. table PC C. digitizing tablet D. touch coding system

Computer Science & Information Technology

Here is a list of file names with extensions. Pick at least one that could properly be the implementation file and at least one that can properly serve as interface file.

a. File.cxx b. File.hxx c. File.cc d. File.h e. File.cpp f. File.hpp

Computer Science & Information Technology