A network stream needs to be encrypted. Sara, the network administrator, has selected a cipher which will encrypt 8 bits at a time before sending the data across the network. Which of the following has Sara selected?
A. Block cipher
B. Stream cipher
C. CRC
D. Hashing algorithm
Answer: A. Block cipher
You might also like to view...
Select the false statement.
a. All data items can eventually be reduced to a sequence of 0s and 1s. b. A binary digit (bit) can store two values simultaneously. c. It is cumbersome to work with data in bit form. d. It is easiest to produce electronic devices that can assume one of two stable states.
2. An event listener is ___.
A. something that happens, such as mouse clicks, keystrokes, and touches (for touch enabled devices), while a program is running and interrupts the program’s flow B. an object that listens for events, such as mouse, keyboard, and touch events C. a function that will be executed when the event occurs
What are breadcrumbs? What purpose do they serve? When are they useful?
What will be an ideal response?
The empty space at the top, bottom, left, and right side of a document is called a ________
A) border B) margin C) template D) selection