1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Doss [256]
3 years ago
14

A common technique for masking contents of messages or other information traffic so that opponents can not extract the informati

on from the message is: A. integrity B. encryption C. analysis
Computers and Technology
1 answer:
Sladkaya [172]3 years ago
5 0

Answer:

Option B is the correct answer for the above question.

Explanation:

Encryption is techniques that give the features to hide the original text in the back of some other text which has no means for the other person. It is a technique that is followed by the person at the time of message transfer. The encryption changes the original message into a duplicate message on the sender ends and get the original message from the duplicates message on the destination ends with the help of some algorithm.

The above question asked about the techniques which convert the message into duplicate one so that no unauthorized user can read the message. Then the techniques known as Encryption which is stated from the option B. Hence Option B is the correct answer while the other is not because--

  • Option A states about integrity which is not a technique to change the original message into a duplicate message.
  • Option C states about analysis which is also not a technique to change the original message into the duplicate message.

You might be interested in
PLEASE PLEASE PLEASE PLEASE HELP ASAP!!!!! I PROMISE I WILL GIVE YOU A BRAINLIEST FOR THE CORRECT ANSWER PLEASE HELP!!
inysia [295]
The answer will be C

As she is about to leave the position, in account of professionalism, she should NOT do any unnecessary harm to the current company, and  she should notify the company for necessary description before leaving. 
5 0
3 years ago
Read 2 more answers
Which of the following is true about parallel computing performance?
Ierofanga [76]

Answer:

Computations use multiple processors. There is an increase in speed.

Explanation:

The increase in speed is loosely tied to the number of processor or computers used.

Mark me a brainliest answer

4 0
3 years ago
Which of the following image file formats uses lossy file compression?
enyata [817]

Answer:

JPEG

Explanation:

5 0
3 years ago
A ___________ organizes related commands together, under a tab.
notsponge [240]
A menu bar organizes related commands together, under a tab.
So the answer is <span>b. menu bar</span>
8 0
3 years ago
Which encryption standard uses Advanced Encryption Standard (AES), a 128-bit block cipher that is much tougher to crack than the
Alchen [17]

Answer:

Wi-Fi Protected Access 2 (WPA2)

Explanation:

The Wi-Fi Protected Access 2 (WPA2) makes some alterations to the encryption algorithm that were used in WPA and WEP to what is known as the  Advanced Encryption Standard (AES). This is a 128-bit block cipher considered to be much more difficult to crack than the usual 128-bit TKIP wrapper. However, although WPA2 offers a much more tougher encryption standard, it is important to note that it is not hack proof.

5 0
3 years ago
Other questions:
  • PLEASE HELP Which of the following is considered a modern method of communication?
    6·2 answers
  • A plan that outlines the steps and timeline for reaching a certain goal is called a(n):
    13·1 answer
  • Which routine best ensures email safety?
    7·2 answers
  • Which of the following options would you use when saving a document with a new filename? *
    12·2 answers
  • You are an administrator for contoso.com. you have two servers called server1 and server2 that run windows server 2012 and have
    9·1 answer
  • Warm colors including red, yellow and orange _____________ be energetic and exciting to the eye, while cool colors in blue, gree
    11·1 answer
  • Advantages of heading attributes
    5·1 answer
  • George is sketching a wireframe representation of the home page of his website. What aspect of the home page would be impossible
    11·1 answer
  • Jettison folk 2007, Magnum opus, be moving, offers poisoned commentary on the film industry.
    7·1 answer
  • Which generation computer supported GUI operating system?​
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!