Answer:
computer science is the study of computer and computing as well as theoretical and practical applications.
pls give me thanks ☺️☺️
Answer:
The correct option is C: For objects to communicate effectively with one another, each must know how the other object is implemented.
Explanation:
For effective communication of objects with each other, there is no need for each object to know how the other object is implemented. The rules for communication are already defined, and hence you do not have to know, as details of implementation are hidden. Hence the only false statement from the options is C.
Answer:
Document Inspector option can be used to automatically scan a document to prepare it for publishing, identifying personal information that should be removed
Explanation:
Document scanner: This converts the text written in the paper in to a digital form. Most probably it will convert the text in paper in to image only.
Document Inspector is the tool which removes the personal information while sharing the document. The personal information can be name, mail id, phone number etc. This personal information though hidden will get reflected while publishing and this document inspector allow us to protect these data from sharing.
Privacy manager: This is a software reducing the risk of unauthorized access of data
Security manager: This once again protect the document.
There are two main types of encryption - <span>symmetric and asymmetric.
Using symmetric encryption, you use a single secret key that is used to both encrypt and decrypt the data. This form of encryption has been used way before computers! Without this key it is very hard to decrypt a message. However, the issue with this is that if you want to send an encrypted message, you also have to send a key to them, and </span>if your somebody unintended intercepts the
key, they can read the message.
What's the solution? Asymmetric cryptography or public key encryption. Asymmetric cryptography uses encryption that splits the key into two
smaller keys. One of the keys is public and one is kept private.
A good metaphor for understanding this is the public key is the lock, and the private key is the key. You can encrypt a message to send to somebody with their public key, locking it, which they can then decrypt, unlock, with their private key. And vice versa. So with this kind of encryption it's very difficult to decrypt a message for anybody but the owner as it's much harder to steal when it doesn't need to leave their computer, but easy to encrypt messages to send to them