Match each item with a statement below.

A. The hiding of messages in such a way that no one but the sender and intended recipient of the message even knows a message exists
B. An encryption method or process encompassing the algorithm, key(s) and/or cryptovariable(s), and procedures used to perform encryption and decryption
C. The process of rearranging plaintext values to form ciphertext
D. The encoded message resulting from an encryption
E. To encrypt, encode, or convert plaintext into the equivalent ciphertext
F. The process of replacing plaintext values with other values to form ciphertext
G. To decrypt, decode, or convert ciphertext into the equivalent plaintext
H. The programmatic steps used to convert an unencrypted message into an encrypted sequence of bits that represents the message
I. The process of converting components (words or phrases) of an unencrypted message into encrypted components


A. Steganography
B. Cryptosystem
C. Transposition
D. Cryptogram
E. Encipher
F. Substitution
G. Decipher
H. Algorithm
I. Code

Computer Science & Information Technology

You might also like to view...

You can use a moveAndOrientTo() message to reorient any object in the object tree.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

When Windows 8.1 connects to a new wireless network, it prompts you to decide whether you want to turn on sharing for that network. Selecting No, don't turn on sharing or connect to devices tells Windows 8.1 to configure the connection as a ________ network

Fill in the blank(s) with correct word

Computer Science & Information Technology

?

A. Orientation that is wider than tall B. Every object added to a slide is added in a(n) new ____. C. Program used to create an object D. Moving an item higher in the outline E. Displays the outline of the presentation in the Outline tab F. Collection of slides saved as individual files on a SharePoint server G. Program used to create the file where you want to insert the object H. File that initially contains the object I. Moving an item lower in the outline J. Orientation that is taller than wide K. ?When you can edit the object using the source program's commands

Computer Science & Information Technology

________ occurs when computers or machines can perform the work that was once done by a human.

A. Green computing B. Outsourcing C. Automation D. Telecommuting

Computer Science & Information Technology