1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
luda_lava [24]
3 years ago
12

Encryption is the process of:

Computers and Technology
1 answer:
Tanya [424]3 years ago
6 0

Answer:

b.

Explanation:

disguising is a bit of a misleading term here. But basically, yeah, you're replacing one message by an 'encrypted' message, using mathematical rules. To reconstruct the original message, you'll need some key data and the inverse mathematical rules.

You might be interested in
A homeowner uses a smart assistant to set the house alarm, get packages delivery updates, and set time on the outdoor lights. Wh
ch4aika [34]

The example where the alarm of the house set up, delivery updated should be provided, etc should represent the function example of the artificial intelligence.

The following information related to artificial intelligence is:

  • It refers to the human intelligence where the machines could be treated as humans and according to this, the actions should be mimic.
  • It should be used for any kind of machine where the traits should be associated along with the mind of the human-like for learning & problem-solving purpose.

Therefore we can conclude that The example where the alarm of the house set up, delivery updated should be provided, etc should represent the function example of the artificial intelligence.

Learn more about the machine here: brainly.com/question/2555822

3 0
3 years ago
Q1) Convert the decimal number 67 to binary?​
Mashutka [201]

Answer:

1000011

Explanation:

4 0
3 years ago
Give atleast 5 example of ENFRAMING in our daily lives
ddd [48]

Answer:

1. steel is produced to be used in such things as the production of automobiles, and, although steel is not the automobile, it is, nevertheless, affected by the “coming into being” of the automobile.

8 0
2 years ago
Read 2 more answers
Where do high tides occur? (Select two.) WILLLL GIVVEEE BBRRAANNLLEESSTTTM PLSS AASSAAPP
bija089 [108]

Answer:

Maybe both?

Explanation:

High tides and low tides are caused by the Moon. The Moon's gravitational pull generates something called the tidal force. The tidal force causes Earth—and its water—to bulge out on the side closest to the Moon and the side farthest from the Moon. These bulges of water are high tides. (hope this helps)

6 0
3 years ago
Read 2 more answers
A computer hacker usually gets into a company’s network by _____.
sdas [7]
B) Finding a single unlocked door in a virtual hallway

At least this is what I believe the answer is.
3 0
3 years ago
Read 2 more answers
Other questions:
  • Why is knowledge of percent composition important in the mining process?
    7·1 answer
  • What is computer ????
    11·1 answer
  • What is ucspi-tcp pakage in qmail??
    5·1 answer
  • If a computer is capable only of manipulating and storing integers, what di themselves? How are these difficulties overcome
    13·1 answer
  • In risk management what does risk evaluation involved
    14·1 answer
  • Microsoft edge is a web browser that was designed as an add-in to internet explorer. true or false
    5·1 answer
  • What is the definition of Overflow Error?
    5·1 answer
  • What number system that has 16 numerals
    11·2 answers
  • Expain the application areas of ICT in education sector and E-commerce​
    12·1 answer
  • In a black box model are the customers told that they should be expecting to be haxked?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!