1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
juin [17]
3 years ago
5

Which of the following involves writing hidden messages so that only the sender and intended recipient know a message exists? St

eganography Anti-forensics Biometrics Virtualization security
Computers and Technology
1 answer:
AnnZ [28]3 years ago
6 0

Answer:

Steganography  

Explanation:

Steganography

This technique involves hiding the message being transferred between the sender and the recipient.

1. The message is hidden by converting the original message into covered or hidden writing. This is done using the key like in cryptography.

2. This hidden message is placed on the medium through which communication takes place. The medium is called as the carrier.

3. The key along with the covered message is also placed on the carrier. The recipient should receive both the message and the key.

Steganography can also be described as hiding the secret message inside an ordinary message. The key is used to unlock the secret message.

This process makes the actual message hidden for the naked eye.

Only the actual message is hidden, not the fact that the messages are being exchanged between the two parties.

The purpose of this technique is that the actual message should be viewed and understood by the sender and the recipient only.

Any third party should not be able to view and/ or understand the communication taking place even if the communication becomes accessible to any third party.

Unlike cryptography, the hidden message should not gain any attention of other parties involved.

Cryptography

This is different from cryptography. In cryptography, the actual message is converted into some other form called cipher text. The cipher text is not hidden between other messages; it is visible to the third party that the cipher text is being communicated.

Steganography techniques are applicable to all kinds of messages including text, audio, video and also images.

Uses

Steganography plays a vital role in preventing pirated copyright materials and also prevents unauthorized viewing of the material.

Techniques

1. Hash marking - The message is written in letters which also includes hash marks.

2. Watermarking - This technique includes hiding the copyrighted material between a collection of files. This gives additional protection to the material.

You might be interested in
When disabling inherited permissions on an object, what happens if you select Remove all inherited permissions from this object?
Rasek [7]

Answer:

Answer explained below

Explanation:

When disabling inherited permissions on an object, if you select Remove all inherited permissions from this object then you lose every user or group assigned to the folder.

This will delete all existing permissions, including administrator accounts, leaving you a blank slate to apply your own permissions to the folder.

5 0
3 years ago
What dose it need For a device to be considered a kind of computer
const2013 [10]

Answer:

Micro controller or MCU (Microcontroller Unit)

Explanation:

Micro Controller Unit is basically a computer on a chip with all components fabricated onto it. It is the core component of a computer.

A Micro Controller has:

  • Central Processing Unit CPU
  • Random access memory RAM
  • Read-only memory ROM
  • I/O peripherals
  • Timers
  • Serial COM ports

all fabricated on a single chip so that it may be connected via buses for providing the desired functionality.

<h3>I hope it will help you!</h3>
8 0
3 years ago
Read 2 more answers
Modern ancestor of the typewriter
Rashid [163]
I would think Microsoft Word would be the answer. It does everything a typewriter can.
4 0
3 years ago
Read 2 more answers
To place the caption at the top of the image you will need to change the ________
makkiz [27]

wrong!! it was postion!!

4 0
3 years ago
Robert's computer is not starting due to an error in the BIOS. Which of these chips could have malfunctioned? Select the correct
timofeeve [1]

Hi;

In the question, Robert gives the explanation that there is an error in the BIOS. A BIOS (Standing for Basic Input & Output System) is a ROM chip, and is vital for the computer to initialize devices such as RAM, the CPU, etc. If there is ever an error there, a computer simply cannot boot.

From the options given, your answer given would be C. ROM.

I hope this helps!

8 0
3 years ago
Other questions:
  • Cleo finds herself frequently searching for messages from particular senders or with specific subjects. What should she create
    5·1 answer
  • After doing the route tracing to a particular IP addresses, paste the path of IP addresses that were taken from your IP address
    13·1 answer
  • Which topology enables only one person, at one time, to send data to others on the network?
    6·1 answer
  • In codd's model of a relational database, data is stored in a(n) _____, which maintains information about a(
    7·1 answer
  • To hide gridline when you display or print a worksheet
    14·1 answer
  • What are the differences in LAN and WAN and how they are used to Increase Cybersecurity
    7·1 answer
  • Please Help Me!!!!!!!!!!!!!
    5·1 answer
  • Write a programmer defined function that compares the ASCII sum of two strings. To compute the ASCII sum, you need to compute th
    6·1 answer
  • 1) SuperFetch is a memory-management technique that a) determines the type of RAM your system requires. b) makes the boot-up tim
    7·1 answer
  • Which of the phases of the software development life cycle (SDLC) would the following action take place in?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!