1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Doss [256]
3 years ago
14

A common technique for masking contents of messages or other information traffic so that opponents can not extract the informati

on from the message is: A. integrity B. encryption C. analysis
Computers and Technology
1 answer:
Sladkaya [172]3 years ago
5 0

Answer:

Option B is the correct answer for the above question.

Explanation:

Encryption is techniques that give the features to hide the original text in the back of some other text which has no means for the other person. It is a technique that is followed by the person at the time of message transfer. The encryption changes the original message into a duplicate message on the sender ends and get the original message from the duplicates message on the destination ends with the help of some algorithm.

The above question asked about the techniques which convert the message into duplicate one so that no unauthorized user can read the message. Then the techniques known as Encryption which is stated from the option B. Hence Option B is the correct answer while the other is not because--

  • Option A states about integrity which is not a technique to change the original message into a duplicate message.
  • Option C states about analysis which is also not a technique to change the original message into the duplicate message.

You might be interested in
_____ lets you look at two documents at the same time.
jasenka [17]
B. Side by side view
6 0
3 years ago
Abusive behavior, which involves the use of an electronic communications device, that is degrading, humiliating, hurtful, insult
BARSIC [14]

B because this words degrading, humiliating, hurtful, insulting, intimidating, malicious, or otherwise offensive to an individual or group of individuals causing substantial emotional distress

7 0
3 years ago
Consider a physical transmission medium of capacity C bits/sec between two stations that have I bits of information sent/receive
levacccp [35]

Answer:

Check the explanation

Explanation:

when calculating the total time to send the I bits of information or The packet delivery time or latency which can be said to be the amount of time from when the first bit leaves the point of transmission until the last is received. When it comes to a physical link, it can be computed or determined as: Packet delivery time = Transmission time + Propagation delay.

Kindly check the attached image below to get the step by step explanation to the above question.

5 0
3 years ago
Which of the following is true for an API? I. Allows different devices to connect with each other II. Allows for Interactivity b
Zina [86]

Answer:

All of the above.

Explanation:

API is an acronym for application programming interface and it can be defined as a software intermediary (computing interface) comprising of sets of codes, tools and protocols that helps software applications and the computer to communicate with each other, as well enable the exchange of data. Some examples of popular APIs are Go-ogle, Face-book, Twitter etc.

The main characteristics and functions of an application programming interface (API) includes;

I. Allows different devices to connect with each other.

II. Allows for Interactivity between devices and software.

III. Messenger program that takes requests and delivers the response back to the user.

IV. Allows the creation of applications that access the features or data of an operating system, application, or other services.

V. Specifies how software components should interact.

VI. Used when programming graphical user interface (GUI) components

6 0
3 years ago
Ayúdenme porfa se los agradecería :c
babymother [125]

Answer:

Me podrían ayudar se lo agradecería un montón

5 0
3 years ago
Other questions:
  • If your bank is a member of the fdic, what does that mean for you?
    10·2 answers
  • 1. To type a capital "C", you would use the ring finger of your left hand.
    15·2 answers
  • Write a program which:
    10·1 answer
  • _____ is the widely used transport layer protocol that most Internet applications use with Internet Protocol (IP).
    9·1 answer
  • MICR is an input or output devices
    5·1 answer
  • Describe three perimeter intrusion detection systems and give an example of one that you have seen deployed either at work or an
    8·1 answer
  • Write a program that reads an unspecified number of integers, determines how many positive and negative values have been read, a
    8·1 answer
  • Describe at least two other companies that are direct or indirect competitors to your company. Explain how you will differentiat
    15·1 answer
  • Which term describes the distance from one point on a wave to the same point on the next wave?
    13·2 answers
  • What is an example of work performed by an integration platform as a service (ipaas)?
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!