1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
frez [133]
3 years ago
6

9. In Electronic Codebook (ECB): a. The message is broken into independent blocks which are encrypted b. The message is broken i

nto dependent blocks which are encrypted c. The message is broken into independent blocks which are digitally signed d. The message is broken into dependent blocks which are authenticated
Computers and Technology
1 answer:
DaniilM [7]3 years ago
8 0

Answer:

The correct answer is letter "A": The message is broken into independent blocks which are encrypted.

Explanation:

There are five (5) main forms of encryption: <em>Electronic Code Book (ECB), Cipher Block Chaining (CBC), Cipher Feedback (CFB), Output Feedback (OFB), and Output Feedback (OFB)</em>. Electronic Code Book (ECB) is the simplest of all of them. Using this method to encrypt information implies dividing a message into two parts to encrypt each block independently. ECB does not hide patterns effectively because the blocks are encrypted using identical plaintexts.

You might be interested in
Which of the following is a change that will not affect the pressure in a container?
ohaa [14]
"<span>changing the weight of the fluid" because the water in the container can be 1,000,000lb and the pressure will not change

hope that helped</span>
7 0
3 years ago
Read 2 more answers
CC stand for.....in the email platform?
Elena L [17]
CC stands for Carbon Copy in emails.
6 0
3 years ago
Read 2 more answers
• The technical support department at your company has informed you that you will be receiving a new computer within the next we
alexdok [17]
1) back up your data
2) delete any personal information
3) clear cookies, browsing data, and saved passwords
4) restore any settings you may have changed to original settings
6 0
3 years ago
Before her shift as a cashier at the grocery store, Carla pulls her hair back into a ponytail and makes sure her fingernails are
Kobotan [32]

Answer:

is shows that the cashier has a good habit and has a good sense of hygiene

3 0
3 years ago
In company a, there is a team that performs day-to-day it operations with a focus on security. they are responsible for a wide r
jasenka [17]

The security operation being carried out by this team is Administrative in nature.

<h3>What is the role of an Administrators?</h3>

An Administrators is known to be a person who works or handles the day-to-day deployment, operation and looking of an IT environment.

Note that their areas of concern are the systems, networks and applications as well as others and as such, The security operation being carried out by this team is Administrative in nature.

Learn more about  security operation from

brainly.com/question/371967

#SPJ1

6 0
2 years ago
Other questions:
  • Write a method so that the main() code below can be replaced by the simpler code that calls method mphAndMinutesToMiles(). Origi
    6·2 answers
  • You listened to a song on your computer. Did you use hardware or software? Explain.
    11·2 answers
  • 1). What is the proper name of the healing agent?
    5·1 answer
  • PLEASE DON'T DELETE THIS QUESTION!!!!
    15·2 answers
  • Give sally sue specific suggestions on how she can improve her powerpoint skills
    5·1 answer
  • Together with some anthropologists, you’re studying a sparsely populated region of a rainforest, where 50 farmers live along a 5
    15·1 answer
  • relational integrity constraints are rules that enforce basic and fundamental information-based constraints. True or False
    9·1 answer
  • Write an if-else statement for the following: If user_tickets is less than 5, assign 1 to num_tickets. Else, assign user_tickets
    6·1 answer
  • An organization's Finance Director is convinced special malware is responsible for targeting and infecting the finance departmen
    13·1 answer
  • Select the correct answer.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!