1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
liq [111]
3 years ago
14

Why is voice encryption an important digital security measure?

Computers and Technology
1 answer:
NISA [10]3 years ago
4 0

Answer: Voice encryption is the end to end encryption/encoding of the the communication taking place through the telephone or mobile devices. The encryptors of voice turn the communication conversation into the digital form which result in stream of bits.

Digital security is the protection and securing of the  devices related with the mobile and online technology. It is important to maintain the security of the information conveyed through the communication. It maintains the protection from the online stealing of the data and fraud.

You might be interested in
Why computer is known as versatile and diligent device ?explain​
pashok25 [27]

They are versatile because they can be used for all sorts of tasks. They can also do many of the same tasks in different ways. They are diligent because they will do a task thoroughly until it is finished.

They work at a constant speed to do the task. Unlike a human, they will not slow down or get bored or start making mistakes that they were not doing earlier. So once they are programmed correctly to do a task, they will do it diligently.

6 0
3 years ago
Complete the statement by entering the appropriate term in the space below.
Vera_Pavlovna [14]

Answer:

Probably "compress", but these days the common answer is "upload to cloud".

Explanation:

Compressing the files is an easy way to reduce their size, unless most of the size is in already compressed, high-entropy formats (like mp3, jpeg or mp4).

The common compression format is .ZIP - you've probably seen it countless times, but other ways like RAR, 7Z are also popular, while Linux users mostly deal with tar.gz, tar.bz2 or tar.xz

On the other hand, the standard practice these days is to upload the presentation to a cloud service, like GSheets or Office PowerPoint 365, which gets rid of the limits of email filesize, while providing a convenient web-app way to view the presentation without downloading (and it doesn't clutter their inbox space or hard drives)! Alternatively, one other way to email any large file (not just a presentation) includes uploading it to some service like DropBox, GDrive or anything similar.

7 0
3 years ago
Read 2 more answers
Which search strategy is most similar to greedy search?
lesya692 [45]

Answer:

I think the answer would be A.

Explanation:

If I'm wrong plz let me know (I think I may be wrong)

8 0
3 years ago
According to the video, what tasks do Carpenters commonly perform? Select four options. supervising Plumbers, Electricians, and
TiliK225 [7]

Answer:

Cutting, shaping, and fastening wood.

Installing rafters, joists, windows, and subflooring.

Setting hardwood floors.

Building kitchen cabinets.

7 0
3 years ago
Read 2 more answers
You can make a table in presentation software?<br> A. <br> FALSE<br> B. <br> TRUE
Serggg [28]
[B] True.

In something like Microsoft Publisher, you are able to go to Insert -> Table, and specify the dimensions for the table you want.
8 0
3 years ago
Other questions:
  • Approximately what percent of U.S. businesses have some form of remote work program? (from Chapter 1)
    14·1 answer
  • A bus topology network is most often deployed as a peer-to-peer network. <br> a. True <br> b. False
    7·1 answer
  • Design an algorithm for a bounded-buffer monitor in which the buffers (portions) are embedded within the monitor itself."
    10·1 answer
  • The part of the computer that contains the brain, or the central processing unit, also knows as the
    5·1 answer
  • 2a
    8·1 answer
  • A and B have same output or not? A B x=0 x=0 do do x&lt;3 x=x+1 x=x+1 print x print x while x&lt;3 while
    13·1 answer
  • Exampels of semantic tags ?​
    7·1 answer
  • A major concern about ESP claims is that proponents explain both the positive and negative findings. By explaining the negative
    14·1 answer
  • Anyone know how to delete it in my laptop
    10·1 answer
  • Why crt and plasma are not used in laptop ?​
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!