1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
juin [17]
4 years ago
5

Which of the following involves writing hidden messages so that only the sender and intended recipient know a message exists? St

eganography Anti-forensics Biometrics Virtualization security
Computers and Technology
1 answer:
AnnZ [28]4 years ago
6 0

Answer:

Steganography  

Explanation:

Steganography

This technique involves hiding the message being transferred between the sender and the recipient.

1. The message is hidden by converting the original message into covered or hidden writing. This is done using the key like in cryptography.

2. This hidden message is placed on the medium through which communication takes place. The medium is called as the carrier.

3. The key along with the covered message is also placed on the carrier. The recipient should receive both the message and the key.

Steganography can also be described as hiding the secret message inside an ordinary message. The key is used to unlock the secret message.

This process makes the actual message hidden for the naked eye.

Only the actual message is hidden, not the fact that the messages are being exchanged between the two parties.

The purpose of this technique is that the actual message should be viewed and understood by the sender and the recipient only.

Any third party should not be able to view and/ or understand the communication taking place even if the communication becomes accessible to any third party.

Unlike cryptography, the hidden message should not gain any attention of other parties involved.

Cryptography

This is different from cryptography. In cryptography, the actual message is converted into some other form called cipher text. The cipher text is not hidden between other messages; it is visible to the third party that the cipher text is being communicated.

Steganography techniques are applicable to all kinds of messages including text, audio, video and also images.

Uses

Steganography plays a vital role in preventing pirated copyright materials and also prevents unauthorized viewing of the material.

Techniques

1. Hash marking - The message is written in letters which also includes hash marks.

2. Watermarking - This technique includes hiding the copyrighted material between a collection of files. This gives additional protection to the material.

You might be interested in
Hotspots are an example of ______________ wireless networks.
maxonik [38]
Hello <span>Jcmandique2740

Answer: </span><span>Hotspots are an example of medium range wireless networks.

Reason: Hotspots do not have a really long range, but do have a longer range then some networks.

Hope This Helps!
-Chris</span>
6 0
3 years ago
Do you think should give credit to people who invented viral dances?
guajiro [1.7K]

Answer:

michal jackson i think who credit to people invented viral dances.

3 0
3 years ago
Read 2 more answers
A firewall relies on or a that determine what traffic should or should not be allowed to pass through
likoan [24]
A firewall determines what external network traffic(internet) should or should not be allowed to pass internal network(computer). A firewall is network security that protects software and hardware from untrusted sites that may have viruses, worms, and bugs that are detrimental to the computer.
5 0
3 years ago
Write a program with a function that accepts a string as an argument and returns a copy of the string with the first character o
Alex Ar [27]

Answer:

def capitalize_first(st):

   capitilized_list = []

   splitted_st = st.split(". ")

   for x in splitted_st:

       capitilized_list.append(x[0].capitalize() + x[1:])

   capitilized_st = ". ".join(capitilized_list)

   return capitilized_st

 

s = input("Enter a string: ")

print(capitalize_first(s))

Explanation:

Create a function called capitalize_first that takes one parameter, st

Create an empty list that will hold the capitalized strings

Split the given string using split function and put them in the splitted_st

Create a for loop that iterates through splitted_st. For each string in splitted_st, capitalize their first character and put them in the capitalized_list.

When the loop is done, join the strings in the capitalized_list using join function and set the joined string to capitilized_st

Return the capitilized_st

Ask the user for the string

Call the function with entered input and print the result

7 0
3 years ago
The first popular personal computer with a graphical user interface was the Apple Macintosh. Compaq Presario. IBM PC. NeXT works
Pavlova-9 [17]

Answer:

The answer is the Apple Macintosh

Explanation:

The Apple Macintosh PC was the first widely sold and most popular PC with a GUI. It was based on its earlier predecessor called the Apple Lisa which was later killed by the Apple Macintosh OS. Prior to the Apple Macintosh was the Xerox PARC which was the first PC to support an OS that was based on GUI. However, the Xerox was not a popular commercial product  and was intended for University research only

7 0
3 years ago
Other questions:
  • Which generation is called the new silent generation?
    6·1 answer
  • What is the purpose of the operating systems processor management function
    7·1 answer
  • As long as users refer to files in the ____ directory, they can access the files without entering the absolute filename.
    10·1 answer
  • The major types of wireless media are______________.
    6·1 answer
  • Surprisingly, many of us may be unknowing victims of botnets. Because of the rising sophistication of botnet schemes, your compu
    14·1 answer
  • During an upgrade for a new web server, Glen's company experienced a power surge. The power surge hit the new server, and now th
    10·1 answer
  • What should you include in a persuasive speech
    14·1 answer
  • [BRAINLIEST!!!! Which concept in OOP explains the relationship between the classes Nation and President, where the class Nation
    6·2 answers
  • Dynamic addressing: __________.
    12·2 answers
  • If the bookstore sold 8 books for $66 at that rate how much was one book
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!