1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
juin [17]
3 years ago
5

Which of the following involves writing hidden messages so that only the sender and intended recipient know a message exists? St

eganography Anti-forensics Biometrics Virtualization security
Computers and Technology
1 answer:
AnnZ [28]3 years ago
6 0

Answer:

Steganography  

Explanation:

Steganography

This technique involves hiding the message being transferred between the sender and the recipient.

1. The message is hidden by converting the original message into covered or hidden writing. This is done using the key like in cryptography.

2. This hidden message is placed on the medium through which communication takes place. The medium is called as the carrier.

3. The key along with the covered message is also placed on the carrier. The recipient should receive both the message and the key.

Steganography can also be described as hiding the secret message inside an ordinary message. The key is used to unlock the secret message.

This process makes the actual message hidden for the naked eye.

Only the actual message is hidden, not the fact that the messages are being exchanged between the two parties.

The purpose of this technique is that the actual message should be viewed and understood by the sender and the recipient only.

Any third party should not be able to view and/ or understand the communication taking place even if the communication becomes accessible to any third party.

Unlike cryptography, the hidden message should not gain any attention of other parties involved.

Cryptography

This is different from cryptography. In cryptography, the actual message is converted into some other form called cipher text. The cipher text is not hidden between other messages; it is visible to the third party that the cipher text is being communicated.

Steganography techniques are applicable to all kinds of messages including text, audio, video and also images.

Uses

Steganography plays a vital role in preventing pirated copyright materials and also prevents unauthorized viewing of the material.

Techniques

1. Hash marking - The message is written in letters which also includes hash marks.

2. Watermarking - This technique includes hiding the copyrighted material between a collection of files. This gives additional protection to the material.

You might be interested in
____ is suitable for what are called "high-volume service control applications" such as dial-in access to a corporate network.
Levart [38]

Answer: a. RADIUS

Explanation:

RADIUS as developed with the idea of allowing its users or clients to be able to authenticate to a dial-in access server. So basically it is a client server protocol and he client here is the firebox and the server is the RADIUS server.  

The authentication mechanism start by user who sends a message to the RADIUS server. Then the RADIUS server upon receiving the message accept or denies it. It accepts if the client is configured to the server.

A large amount of additional information can be sent by the RADIUS server in its Access-Accept messages with users so we can say that RADIUS is uitable for what are called "high-volume service control applications" such as dial-in access to a corporate network.

3 0
3 years ago
Plz can someone tell me the answers ?
Ganezh [65]

Answer:

you can

Explanation:

you can

5 0
3 years ago
Read 2 more answers
Which organization or agency would assist the fire department with incident scene security, crowd control, and explosives dispos
Sav [38]

The organization or agency would assist the fire department with incident scene security, crowd control, and explosives disposal is law <u>enforcement</u>.

<h3>What is Law enforcement?</h3>

Law enforcement is said to be activity of a given members of government and they are said to often act in an organized manner to enforce law by knowing , deterring people who violate the rules and regulations that are governing that society.

hence, The organization or agency would assist the fire department with incident scene security, crowd control, and explosives disposal is law <u>enforcement</u>.

Learn more about law enforcement from

brainly.com/question/21082629

#SPJ1

8 0
2 years ago
What is sexual intercourse <br><br>​
n200080 [17]

Answer:

immmm ....

I know the answer but I won't tell..lolllll

7 0
3 years ago
Read 2 more answers
A small company with 100 computers has hired you to install a local area network. All fo the users perform functions like email,
Nadusha1986 [10]

Answer:

Based on the requirements indicated in the question above, the best Local Area Network (LAN) operating system that can be used is

Windows 7 , 8.1 or Windows 10. This is because they all are configured to handle extensive LAN activity and can connect over 200 users.

Explanation:  

Generally speaking, Windows 10 packs more improvement over the previous windows.

Cheers

6 0
3 years ago
Other questions:
  • In addition to the four primary computer operations, today's computers almost always perform ____ functions.
    7·1 answer
  • Peter has a website that promotes his local vacation rental site. He uses Google Ads to manage his advertising campaign. He’s cr
    13·1 answer
  • To see all of the records at once, you should use _______ view. 
    12·2 answers
  • An information system includes _____, which are programs that handle the input, manage the processing logic, and provide the req
    14·1 answer
  • A program runs from start to finish, producing unexpected results, though no error message is received. What most likely occurre
    15·1 answer
  • Ok so I’m using a word document and towards the bottom of the page it stops me from moving my text box any further down even tho
    13·2 answers
  • A small network that consists of devices connected by Bluetooth, such as a smartphone and a computer, is referred to as a ______
    14·1 answer
  • What is Utility Software ? Name any two utility programs. <br>​
    15·2 answers
  • Which of the following is not harmful to the computer?<br> a) Trojan<br> b) Rootkit<br> c)Malware
    15·1 answer
  • TO Cloud
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!