If user output is ''red purble yellow exit'': red purple yellow import java.util.Scanner; import java. io.PrintWriter; import java. io.StringWriter; public class StringStreamOutput { public static void main (String [] args) { Scanner snr = new Scanner(Scanner.in); Stringuseritem = ''''; StringWriter itemcharStream = new StringWriter(); PrinterWriter itemsOSS = new PrintWriter(itemcharStream); System.out.printIn(''Enter items (type Exit to open):''); useritem = scnr.next(); while (!userItems.Equals(''Exit'')) { /*Your solution goes here*/ UserItem = scnr.nxt(); } useritem = itemCharStream.toString() System.out.printin(useritem); return; } }
Answer:
confidentiality
Explanation:
Alice sends a message to Bob in a manner such that Bob is the only person who can tell what the real message is. Which security concept is this an example of
Answer:
Option A is correct.
Explanation:
The following is an illustration of such a resource which is also personal usage as well as corporate capital, that system required primarily to track the contribution of both the Chief executive and also to execute the Form 1040.
- Option B is incorrect because the system required exclusively to email workers concerning the operations of the organization isn't an illustration of such a resource which is both personal usage and commercial property.
- Option C is also incorrect because it is seen that the following option is not the illustration of such a scenario.
- Option D is incorrect because the storage facility being required through the Chief executive to preserve confidential documents is not the correct illustration of such a scenario.
- Option E is incorrect because there are not all the resources are for the personal as well as commercial use.
Answer: Anonymization
Explanation: Anonymization is the mechanism followed on the data for it's security. It is the process in which the data is eliminated on the basis that it is particularly identifiable by the features like last name and other specific features. It is also done by the encryption technique to protect the information. The data that has been specifically identified are specified as anonymous.