1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Doss [256]
2 years ago
14

A common technique for masking contents of messages or other information traffic so that opponents can not extract the informati

on from the message is: A. integrity B. encryption C. analysis
Computers and Technology
1 answer:
Sladkaya [172]2 years ago
5 0

Answer:

Option B is the correct answer for the above question.

Explanation:

Encryption is techniques that give the features to hide the original text in the back of some other text which has no means for the other person. It is a technique that is followed by the person at the time of message transfer. The encryption changes the original message into a duplicate message on the sender ends and get the original message from the duplicates message on the destination ends with the help of some algorithm.

The above question asked about the techniques which convert the message into duplicate one so that no unauthorized user can read the message. Then the techniques known as Encryption which is stated from the option B. Hence Option B is the correct answer while the other is not because--

  • Option A states about integrity which is not a technique to change the original message into a duplicate message.
  • Option C states about analysis which is also not a technique to change the original message into the duplicate message.

You might be interested in
The person or persons requesting the worksheet should supply their requirements in a _____ document
ziro4ka [17]
<span>The person or persons requesting the worksheet should supply their requirements in a requirements document. </span>
3 0
3 years ago
Mintzberg's classification of organizational structure categorizes the knowledge-based organization where goods and services dep
sineoko [7]

Answer:

The correct answer to the following question will be Option 3 (Professional bureaucracy).

Explanation:

  • Professional bureaucracy is evidence that uncentralized organizations can be administrative. Their organizational function is reliable, culminating in "preconceived or repetitive actions, in essence, uniform."It's also very complicated, and so the operators who are doing it should be regulated.
  • Mintzberg's organizational framework categorization classifies the information-based organization where services and goods depend as a highly qualified bureaucracy on both the knowledge and expertise of experts.

The other alternatives are not related to the structure of the Mintzberg. So choice 3 is the correct answer.

8 0
3 years ago
Now, we’re ready to program! Leave the visualizer and go back to https://repl.it/ to write your program. Here is the pseudocode
svlad2 [7]

Answer:

here

Explanation:

6 0
2 years ago
___ refers to the use of key performance indicators to monitor performance of the entire supply chain, including sourcing, plann
Komok [63]

Answer:

Supply chain analytics

Explanation:

-Supply chain analytics refers to analyzing data using different tools that allow to evaluate the performance of the supply chain and make decisions.

-Supply chain strategy refers to the plan the company designs to take the products from suppliers to distributors.

-Supply chain visibility refers to the company being able to know where the inventory is when it is moved from the producer to the destination.

-Supply chain optimization refers to everything the company uses to have the best supply chain operation possible.

-Supply chain integration is when all the steps of the process involved in manufacturing a product and getting it to its final destination are integrated.

According to this, the answer is that supply chain analytics refers to the use of key performance indicators to monitor performance of the entire supply chain, including sourcing, planning, production, and distribution.

7 0
2 years ago
Which security measure provides protection from IP spoofing?
anyanavicka [17]

Answer:

An SSL also provides protection from IP spoofing.

8 0
3 years ago
Other questions:
  • Why do networks need standards?
    12·1 answer
  • The /tmp directory is a temporary directory and will not exist on a system at all times. True or False?
    15·1 answer
  • To name a computed field, follow the computation with the word ____ and then the name you wish to assign to the field
    8·1 answer
  • Which of the following is an example of a direct payment subsidy?
    12·1 answer
  • Buying an existing business
    7·1 answer
  • Select the correct answer. Linda has written a program that works well on various operating systems, but she needs to increase t
    10·1 answer
  • In the context of Information Technology Infrastructure Library, _____ delivers information technology IT services on an ongoing
    14·1 answer
  • Complexities of communication are organized into successive layers of protocols: lower-level layers are more specific to medium,
    8·1 answer
  • What do u say to your bf if he says sayy lesssss
    14·2 answers
  • Int a = 1; int b = 0; int c = -1; if ((b + 1) == a) { b++; c += b; } if (c == a) { a--; b = 4; }
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!