1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Doss [256]
3 years ago
14

A common technique for masking contents of messages or other information traffic so that opponents can not extract the informati

on from the message is: A. integrity B. encryption C. analysis
Computers and Technology
1 answer:
Sladkaya [172]3 years ago
5 0

Answer:

Option B is the correct answer for the above question.

Explanation:

Encryption is techniques that give the features to hide the original text in the back of some other text which has no means for the other person. It is a technique that is followed by the person at the time of message transfer. The encryption changes the original message into a duplicate message on the sender ends and get the original message from the duplicates message on the destination ends with the help of some algorithm.

The above question asked about the techniques which convert the message into duplicate one so that no unauthorized user can read the message. Then the techniques known as Encryption which is stated from the option B. Hence Option B is the correct answer while the other is not because--

  • Option A states about integrity which is not a technique to change the original message into a duplicate message.
  • Option C states about analysis which is also not a technique to change the original message into the duplicate message.

You might be interested in
What is a “spoof” of an ad ?
kykrilka [37]
I think a spoof of an ad is the study of an ads rhetorical devices that is what I think I am not completely sure
5 0
3 years ago
Read 2 more answers
Why, during the final stage of the multistage model for e-commerce, is comprehensive customer information captured in the suppli
gulaghasi [49]

The reason why, in the final stage of the model for e-commerce, to captured in the supplier's database is  because it hasten customer service after an order had been delivery.

<h3>What is e-commerce?</h3>

The word electronic commerce  is often known as e-commerce. It is a term that connote a type of business model that gives room for firms and people to buy and sell goods and services using the Internet.

Note that the reason why during the final stage of the multistage model for e-commerce, a comprehensive customer information captured in the supplier's database is important because it boast or make faster customer service when an order have been delivery.

Learn more about  e-commerce from

brainly.com/question/23369154

5 0
2 years ago
True or false FAFSA awards work study, but jobspeaker can be used to learn which jobs are available
Kruka [31]

Answer:

true

Explanation:

random because it's FAFSA and that ain't a word

3 0
2 years ago
Why is contrast important when designing a web page
Phantasy [73]

Contrast is important when designing a web page for many reasons. One of the most important reasons is because if you don't have contrast, you won't be able to read what is written on the page. Your eyes will have to strain really hard or it just simply won't be possible to read at all. Another really important reason is that contrast makes the web page look visually appealing. Whereas, if you don't have contrast it is all kind of jumbled together. As you can see there is a plethora of reasons contrast is important.

I hope that helps u!!

:)

8 0
3 years ago
Please help lots of points worth
Artemon [7]

Answer:

i dont rlly know the first one i mean i guess you cud say the last one? i dunno  srry but the 2nd one is definitively    is Laura woke up to the alarm clock screaming

Explanation:

6 0
3 years ago
Other questions:
  • Consider the following method intended to modify the parameter names by removing all instances of the String n.
    14·1 answer
  • You have a website that sells widgets, and you have a category page specifically for blue widgets. After some extensive outreach
    5·1 answer
  • A primary mailing list for new vulnerabilities, called simply __________, provides time-sensitive coverage of emerging vulnerabi
    10·1 answer
  • Which of the following is NOT a means of advertising on websites?
    12·2 answers
  • You manage 20 windows workstations in your domain network you want to prevent the sales team members from making system changes
    10·1 answer
  • List the various types of social media that have been covered in the tutorial. Mention the key purposes for which each media typ
    9·1 answer
  • What variation of a dictionary attack involves a dictionary attack combined with a brute force attack, and will slightly alter d
    5·1 answer
  • Write two statements to get input values into birthMonth and birthYear. Then write a statement to output the month, a slash, and
    5·1 answer
  • Why do we have to watch a video to get answers?
    7·2 answers
  • Your development team is planning to host a development environment on the cloud. This consists of EC2 and RDS instances. This e
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!