1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Doss [256]
3 years ago
14

A common technique for masking contents of messages or other information traffic so that opponents can not extract the informati

on from the message is: A. integrity B. encryption C. analysis
Computers and Technology
1 answer:
Sladkaya [172]3 years ago
5 0

Answer:

Option B is the correct answer for the above question.

Explanation:

Encryption is techniques that give the features to hide the original text in the back of some other text which has no means for the other person. It is a technique that is followed by the person at the time of message transfer. The encryption changes the original message into a duplicate message on the sender ends and get the original message from the duplicates message on the destination ends with the help of some algorithm.

The above question asked about the techniques which convert the message into duplicate one so that no unauthorized user can read the message. Then the techniques known as Encryption which is stated from the option B. Hence Option B is the correct answer while the other is not because--

  • Option A states about integrity which is not a technique to change the original message into a duplicate message.
  • Option C states about analysis which is also not a technique to change the original message into the duplicate message.

You might be interested in
An administrator is writing into a database and received an error detailed in the exhibit. What two steps need to be taken to re
d1i1m1o1n [39]

An administrator is writing into a database and received an error detailed in the exhibit. The two steps to be taken to resolve this are :

Move the Execute SQL statement to be between Connect and Disconnect. Move the Prompt Message to be before the Disconnect statements.

Explanation:

  • Dynamic SQL refers to SQL statements that are generated at run-time.
  • To disconnect from a database, in the Database Navigator or Projects view, click the connection and then click the Disconnect button in the toolbar or click Database -> Disconnect on the main menu
  • You can also right-click the connection and click Disconnect on the context menu
  • The PROMPT command may be used to display messages to the user, perhaps supplying a short summary of what your script is going to accomplish.
  • The SQL EXECUTE command executes an SQL command and binds the result to 4D objects (arrays, variables or fields).
  • A valid connection must be specified in the current process in order to execute this command. The sqlStatement parameter contains the SQL command to execute.

7 0
3 years ago
2.Use loops to create a 4X6 matrix in which the value of each element is two times its row number minus three times its column n
DiKsa [7]

Answer:

for(i=0; i<4; i++)

{

      for(j=0;j<6;j++)

      {

               A[ i ][ j ] = 2* i - 3*j;

      }

}

Explanation:

In this loop for each i = 0,1,2,3 we fill the the corresponding column values. and then move to next i value i.e. row.

3 0
3 years ago
How many times will the loop body execute:
Xelga [282]
I’d also say B, which is 2
6 0
3 years ago
Select the correct answer.
True [87]

Answer:

office access cars

Explanation:

<em><u>HOPE</u></em><em><u> </u></em><em><u>THIS</u></em><em><u> </u></em><em><u>WILL</u></em><em><u> </u></em><em><u>HELP</u></em><em><u> </u></em><em><u>U</u></em><em><u>,</u></em><em><u> </u></em><em><u>MARK</u></em><em><u> </u></em><em><u>ME</u></em><em><u> </u></em><em><u>AS</u></em><em><u> </u></em><em><u>A</u></em><em><u> </u></em><em><u>BRAINLIST</u></em>

3 0
3 years ago
Define computer on the basis of model.<br><br>Brainliest answer giveaway.<br>​
avanturin [10]

I found that,

On the basis of Model, computer is classified as: XT Computer (Extra Technology): It cannot support GUI based operating system. Its processing speed is 4.77 MHz and Intel 8080, 8086, 8088 series of microprocessors is used. PS/2 Computer: It is a laptop computer which is rechargeable and battery based system.

7 0
3 years ago
Other questions:
  • Header and footer elements such as worksheet name, current date, and time are _____ elements, they change as your worksheet does
    12·1 answer
  • Rikki has had several problems at work recently. Her printer isn't printing correctly, copies from the copy machine come out wit
    8·2 answers
  • How can you add and remove categories from a previously created chart? A. Click the Format tab. B. Click the Chart Styles button
    13·2 answers
  • How to make the heart symbol in photoshop
    13·2 answers
  • The sun produces energy by the process of nuclear: <br><br> A.fission <br> B.fusion
    7·2 answers
  • Given the code that reads a list of integers, complete the number_guess() function, which should choose a random number between
    6·1 answer
  • What is one reason why a business may want to move entirely online?
    12·1 answer
  • Full form of NCP?............
    5·2 answers
  • Which statement about routers is !!!FALSE!!!
    10·1 answer
  • I WILL GIVE BRAINLIST THING TO WHOEVER GIVES ME THE CORRECT ANSWER
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!