1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Doss [256]
3 years ago
14

A common technique for masking contents of messages or other information traffic so that opponents can not extract the informati

on from the message is: A. integrity B. encryption C. analysis
Computers and Technology
1 answer:
Sladkaya [172]3 years ago
5 0

Answer:

Option B is the correct answer for the above question.

Explanation:

Encryption is techniques that give the features to hide the original text in the back of some other text which has no means for the other person. It is a technique that is followed by the person at the time of message transfer. The encryption changes the original message into a duplicate message on the sender ends and get the original message from the duplicates message on the destination ends with the help of some algorithm.

The above question asked about the techniques which convert the message into duplicate one so that no unauthorized user can read the message. Then the techniques known as Encryption which is stated from the option B. Hence Option B is the correct answer while the other is not because--

  • Option A states about integrity which is not a technique to change the original message into a duplicate message.
  • Option C states about analysis which is also not a technique to change the original message into the duplicate message.

You might be interested in
What distinguishes Accenture’s Cloud capabilities from our competitors?
harina [27]

The things that differentiate Accenture’s Cloud capabilities from other competitors is allowing clients to choose the location, memory, and speed of the devices that they want to use.

Cloud computing refers to the delivery of several services through the internet. They're the tools and the applications like servers, databases, software, networking, etc.

Accenture’s Cloud capabilities are different from other competitors as it allows clients to choose the location and speed of the services that they want to enjoy.

Also, Accenture’s Cloud capabilities enable clients to host Cloud services using their own on-premise infrastructure.

Red related link on:

brainly.com/question/25557420

6 0
2 years ago
TASK 1. JUMBLE ME! Direction: Arrange the jumbled letters to form a word. 1. PEREAM 2. RRENT CU 3. METREMO H 4. TORSISER 5. TANC
ivanzaharov [21]

The Rearrangement of the words are:

  1. Ear map
  2. Rent cup
  3. METREON
  4. Sister or
  5. Sister Cane

<h3>What is arrangement of words?</h3>

A sorting method is known to be the orders of entries that are based on each word or phrase found in a heading, e.g. spaces, etc.

The Rearrangement of the words are:

  1. Ear map
  2. Rent cup
  3. METREON
  4. Sister or
  5. Sister Cane

Learn more about Arrangement from

brainly.com/question/984329

#SPJ1

6 0
2 years ago
Which of the following operating systems would allow a user to add functionality and sell or give away their versions?
olchik [2.2K]

Answer:open source

Explanation: what is's called

4 0
2 years ago
Http://moomoo.io/?server=8:16:0
love history [14]

Explanation:

noooooooooooooooooooooooooooooooooo

5 0
3 years ago
Read 2 more answers
What are the different types of topology?​ in details
wlad13 [49]

Answer:

<h2> <u>NETWORK</u> <u>TOPOLOGY</u> .</h2>

This tefers to how nodes are connected to the network.

Types of topology.

  • Physical topology.
  • Logical topology.

In physical topology,nodes are connected physically using wires(cables).

Types of physical topology include:

  • Bus topology
  • Tree topology
  • Hybrid topology
  • Star topology
  • Ring topology.

Hope it helps you,any question so far...comment !!!

3 0
2 years ago
Read 2 more answers
Other questions:
  • Which cloud computing service model gives software developers access to multiple operating systems for testing?
    5·1 answer
  • Nadia would like to find text in her current document that differentiates CompanyABC from companyabc. Which option should she us
    8·2 answers
  • Which of the following is used to encrypt web application data?
    11·1 answer
  • Conduct online research to determine specific conflict-resolution and management techniques and skills that would be beneficial
    5·1 answer
  • Write an expression to print each price in stock_prices. Sample output with inputs: 34.62 76.30 85.05
    9·1 answer
  • What are the answers for edhesive quiz 2? I can’t add more than 1 photo...
    11·1 answer
  • What is the viewport?
    5·1 answer
  • What is the different between the patch Tool and the Headling Brush tool?​
    5·1 answer
  • It is a data being transported on a network​
    13·1 answer
  • NEED ANS ASAP THANK YOU
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!