______________ is the process to scramble a message or other information so that it cannot be easily read

a. Encryption
b. Cryptography
c. Keying
d. Decryption


Answer A.

Computer Science & Information Technology

You might also like to view...

Firewalls work by closing ___________ in your computer

a. logical ports c. logical doors b. software gaps d. backdoors

Computer Science & Information Technology

A(n) __________________ is both the acceptance of IP settings from a DHCP client and the amount of time that the client may hold the IP configuration before it must renew.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Digital signatures are used for ________ authentication.

initial message-by-message Both initial and message-by-message Neither initial nor message-by-message

Computer Science & Information Technology

Which statements about data warehousing is not correct?

A. The data warehouse should be separate from the operational system. B. Data cleansing is a process of transforming data into standard form. C. Drill-down is a data-mining tool available to users of OLAP. D. Normalization is an requirement of databases included in a data warehouse.

Computer Science & Information Technology