1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
juin [17]
3 years ago
5

Which of the following involves writing hidden messages so that only the sender and intended recipient know a message exists? St

eganography Anti-forensics Biometrics Virtualization security
Computers and Technology
1 answer:
AnnZ [28]3 years ago
6 0

Answer:

Steganography  

Explanation:

Steganography

This technique involves hiding the message being transferred between the sender and the recipient.

1. The message is hidden by converting the original message into covered or hidden writing. This is done using the key like in cryptography.

2. This hidden message is placed on the medium through which communication takes place. The medium is called as the carrier.

3. The key along with the covered message is also placed on the carrier. The recipient should receive both the message and the key.

Steganography can also be described as hiding the secret message inside an ordinary message. The key is used to unlock the secret message.

This process makes the actual message hidden for the naked eye.

Only the actual message is hidden, not the fact that the messages are being exchanged between the two parties.

The purpose of this technique is that the actual message should be viewed and understood by the sender and the recipient only.

Any third party should not be able to view and/ or understand the communication taking place even if the communication becomes accessible to any third party.

Unlike cryptography, the hidden message should not gain any attention of other parties involved.

Cryptography

This is different from cryptography. In cryptography, the actual message is converted into some other form called cipher text. The cipher text is not hidden between other messages; it is visible to the third party that the cipher text is being communicated.

Steganography techniques are applicable to all kinds of messages including text, audio, video and also images.

Uses

Steganography plays a vital role in preventing pirated copyright materials and also prevents unauthorized viewing of the material.

Techniques

1. Hash marking - The message is written in letters which also includes hash marks.

2. Watermarking - This technique includes hiding the copyrighted material between a collection of files. This gives additional protection to the material.

You might be interested in
What are the modes of operation of WLANs?
Nimfa-mama [501]

Answer:

WLAN's or Wireless LAN Units have 2 main modes of operation

Explanation:

The Two Main modes of Operation are the following

<u>Infrastructure Mode:</u> in this mode the main WLAN unit becomes the main connection point in which all devices are connected to and the main unit provides an internet connection to all the devices connected to it.

<u>Ad Hoc Mode:</u> in this mode devices transfer data from one another back and forth without permission from a base unit.

Some WLAN units will also include 2 extra modes of operation called Bridge and Wireless Distribution System (WDS).

<u>Bridge Mode:</u> this mode allows the base unit to act as an intermediary and bridge two different connection points. Such as bridging a wired connection with a wireless one.

<u>WDS Mode:</u> this mode uses various access points to wirelessly interconnect devices to the internet using repeaters to transmit connections. It can provide internet to both wired and wireless clients.

I hope this answered your question. If you have any more questions feel free to ask away at Brainly.

6 0
3 years ago
One of the disadvantages of cable technology is that: while it works well for television signals, it is ineffective for data tra
nignag [31]

Answer:

systems used by many providers require customers to share bandwidth with neighbors

Explanation:

One of the disadvantages of cable technology is that systems used by many providers require customers to share bandwidth with neighbors. This ultimately causes many problems since cables would need to be extended to reach every single user that will be sharing the bandwidth. This would mean cables all over the place. Also, it is very difficult to limit the bandwidth per person, meaning that if anyone is using up all of the bandwidth through the cable, the rest of the individuals connected would not have the bandwidth that they need or are paying for.

7 0
2 years ago
Assume you're using a three button mouse. to access shortcut menus, you would
Likurg_2 [28]
<span>Normally you would click the right hand/secondary mouse button but you may configure any of the buttons to work within the Keyboard and Mouse section of System Preferences.
Hope this helps:)</span>
6 0
3 years ago
Read 2 more answers
​Five elements that can prove the genuineness of a user. What you know, what you have, what you are, what you do, and where you
nataly862011 [7]

Authentication factors are the factors that describe about the ingenuition or origination of the user. This is the tag that tells about the actuality of user that is getting connected with internet by the five elementals.

Hope this helps!

8 0
3 years ago
I need help with my solution
NemiM [27]

Answer: B. a = 14 and b = 3

Explanation:

Let's work through the expressions one-by-one:

The first 2 lines create 2 varaibles, a<em> </em>and b, with values of 2 and 7, respectively.

The next line assigns a to the product of a and b.

a * b = 2 * 7 = 14, so the new value of a is 14.

The last line assigns the remainder of b divided by the difference of a and 10.

a - 10 is 14 - 10 which is 4.

The value of b is 7 due to the second expression. 7 % 4 is 3 as 4 goes into 7 once with 3 left over. This value of three is assigned to b.

After all the expressions, the values of the variables are as follows: a = 14 and b = 3.

6 0
1 year ago
Other questions:
  • What human activity would cause a decrease in the population of another species? (The action of humans would impact one species,
    9·1 answer
  • A matrix representation stores matrices such that the offset address of the element in row i and column j can be calculated by c
    12·1 answer
  • The Internet shopping cart is an example of which version of the web?
    15·1 answer
  • Write algorithm to find (a+b)^2=(a+b)*(a+b)​
    9·1 answer
  • How often does colleges update the cost of attendance on their website?.
    13·1 answer
  • What is the information that there are 24 hours in a day and 365 days in a year considered?
    6·2 answers
  • 1. How many questions are on the Consensus Assessment Initiative document?
    10·1 answer
  • Help plz!! I will mark brainliest
    15·2 answers
  • How does microsoft label mac addresses in the windows utilities that show you the mac address?
    13·1 answer
  • What was Ada Lovelace's contribution to computer science?
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!