1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
EastWind [94]
4 years ago
9

__________ offers a mechanism to accomplish four security goals: confidentiality, integrity, authentication, and nonrepudiation.

Computers and Technology
1 answer:
vitfil [10]4 years ago
5 0

Answer:

Cryptography

is the correct answer.

Explanation:

<h2><u>Cryptography</u> offers a mechanism to accomplish four security goals.</h2><h2 />

Cryptography can be defined as technique to format data in such a way that it is Protected. It can be achieved by following goals:

  • Confidentiality is a term that ensures that the data is protected in such a way that it can not be accessed by any unauthorized member. In simpler words any kind of sensitive data is only under the access of people who have authorization key to retrieve or use it.
  • Integrity ensures that the data is real and authenticated. It basically safeguards the actual data.
  • Authentication is a process of verifying an identity by different means. Mostly it includes the the verification by username/password entrance
  • Non-repudiation is basically an surety that the data can't be denied by anyone. Non-repudiation provides the proof that the data is from origin and integrated.

<h3>I hope it will help you!</h3>
You might be interested in
What information should be included in the closing paragraph of a thank-you letter? a. Mention skills that were omitted during t
stiks02 [169]
The answer is c and sorry for being so rude I didn't realize it was you girly

3 0
4 years ago
Read 2 more answers
What lets you change the order of events in a game?
IRISSAK [1]
B the story board editor.
8 0
3 years ago
The ability for a protocol or program to determine that something went wrong is known as_________.
777dan777 [17]

Answer:

The correct answer to the following question will be Error-detection.

Explanation:

Error-detection: The detection of errors caused during the transmission from the transmitter to the receiver by damage and other noises, known as Error-detection. This error-detection has the ability to resolute if something went wrong and if any error occurs in the program.

There are mainly three types of error-detection, these types can be followed:

  • Automatic Repeat Request (ARQ)
  • Forward Error Correction
  • Hybrid Schemes

There are two methods for error-detection, such as:

  • Single parity check
  • Two-dimensional parity check

4 0
3 years ago
When making a While Loop in Python, what button should I press?
olganol [36]
D. None of the above
8 0
3 years ago
"The principle of ______________ states that programs tend to access data and instructions nearby recently used data and instruc
maria [59]

Answer:

<em>Locality of reference.</em>

Explanation:

In computing, The principle of locality of reference is the probability of a processor to repeatedly access the same set of memory locations within a small time interval. This reference of locality can be spatially based (repetitive usage of data within the same location on the computer memory), or temporally based (repetitive usage of a particular data or resources within a shot time interval). The ability of some computing system to perform this action increases their predictability, and efficiency of memory hierarchy use, among other abilities.

4 0
3 years ago
Other questions:
  • 1) What is Net beans
    6·1 answer
  • What is the definition of a protocol, as it applies to networks?
    8·1 answer
  • A stop sign is an example of?
    11·2 answers
  • Write a program that finds the largest in a series of numbers entered by the user.The program must prompt the user to enter numb
    12·1 answer
  • The OneDrive for Business application opens every time you start your program. You want to stop the program from automatically s
    15·1 answer
  • Every character, number, or symbol on the keyboard is represented as a _____ in computer memory.
    10·2 answers
  • A main document in a mail merge contains data, such as names and addresses.
    12·1 answer
  • ____ is designed for short-distance connections and has only a few lambdas, with a greater space between lambdas. Group of answe
    9·2 answers
  • An interface is a class that contains only the method headings and each method heading is terminated with a semicolon. True Fals
    7·1 answer
  • What do you think is the meaning of the saying "Sticks and stones may break my bones, but words can never hurt me"? Do think tha
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!