Encryption is a process
i. To hide the massage
ii. To decipher the massage
iii. To delete the massage
iv. None of them​

Answers

Answer 1

Answer:

answer is i

Explanation:

jjgjnyjghjhkgukhi

Answer 2

Answer:

Encryption is a process by which we can conceal the original message (effectively hiding it)

Explanation:

We typically apply some kind of algorithm to encrypt a message. By doing this we are effectively hiding the original contents of the message so only the people with the appropriate secret key or knowledge of the algorithm can decipher it.


Related Questions

In 2004, a large department store chain in Germany was forced to withdraw customer loyalty cards when the press discovered that the company had secreted radio-frequency identification (RFID) tags in the plastic. Even when enclosed in a wallet or purse, these cards can transmit information over distances of about a meter, and the stores planned to use them to track which departments the customer visited. At issue was which data security issue

Answers

Answer:

the data security issue at issue was consumer privacy.

Explanation:

Consumer privacy refers to how sensitive personal information provided by customers is handled and protected throughout routine transactions.

Consumer privacy is ingrained in all of contact with consumers. Consumer privacy is crucial since it can have an impact on a company's brand, disrupt the customer experience, and potentially harm its reputation.

A company's failure to preserve consumer privacy can prohibit it from generating more income and gaining new customers.

Therefore, the data security issue at issue was consumer privacy.

whats an MAR? lolz better not take my points #bonkers

Answers

Answer:

[tex]\huge\mathcal{\fcolorbox{aqua}{azure}{\red{✿ʏᴏᴜʀ- ᴀɴsᴡᴇʀ ♡❖}}}[/tex]

A Medication Administration Record (MAR, or eMAR for electronic versions), commonly referred to as a drug chart, is the report that serves as a legal record of the drugs administered to a patient at a facility by a health care professional. The MAR is a part of a patient's permanent record on their medical chart

▓▓▓▓▓▓▓✿▓▓▓▓✿▓▓▓▓▓▓▓

[tex]\boxed{\pmb{\green{\sf{MAR}}}}[/tex]

medication administration record:-

 A computer-generated schedule for administering medications to a patient for a defined period of time, including dosing, timing of administration and details about the physician’s orders.

▓▓▓▓▓▓✿▓▓▓▓✿▓▓▓▓▓▓▓▓

Computers work on the garbage-in, garbage-out concept. Comment

Answers

Stands for "Garbage In, Garbage Out." GIGO is a computer science acronym that implies bad input will result in bad output.

Because computers operate using strict logic, invalid input may produce unrecognizable output, or "garbage." For example, if a program asks for an integer and you enter a string, you may get an unexpected result. Similarly, if you try to open a binary file in a text editor, it may display unreadable content.

GIGO is a universal computer science concept, but it only applies to programs that process invalid data. Good programming practice dictates that functions should check for valid input before processing it. A well-written program will avoid producing garbage by not accepting it in the first place. Requiring valid input also helps programs avoid errors that can cause crashes and other erratic behavior.

NOTE: Because the related terms FIFO and LIFO are pronounced with a long "i," GIGO is typically pronounced "guy-go" (not gih-go). This also helps avoid confusion with the prefix "giga," which is pronounced with a soft "i."

Distinguish between afax and a telephone call (5points)​

Answers

Answer:
A fax is an exact copy of a document made by electronic scanning where as a telephone call is a communication or conversation via a telephone

what is a computer in daily life​

Answers

Answer:

The use of computers on a regular basis in our life is very important. Technically in daily life computer is used to convert raw facts and data into meaningful information and knowledge. Computer science is explored and challenged by humans daily. The computer is like an electronic magical device for our life.

Explanation:

write a program to print grade according to percentage which is entered by the user at run time.​

Answers

Explanation:

pseudo code

var A=90%

var B=80%

var C=70%

var F=60%

var input=input

if(input>=A){

console.log(" A")

}

if(input>=B){

console.log(" B")

}

if(input>=C){

console.log(" C")

}

if(input>=F){

console.log("F")

}

what is robotic technology

Answers

Answer:

according to britannica :

"Robotics, design, construction, and use of machines (robots) to perform tasks done traditionally by human beings. ... Robots are widely used in such industries as automobile manufacture to perform simple repetitive tasks, and in industries where work must be performed in environments hazardous to humans"

Explanation:

What is the difference, if any, between a project manager and a producer on a digital media production team? A project manager oversees the entire project, while the producer just oversees the creative element. A project manager just oversees the creative element, while a producer oversees the entire project. A project manager is in charge of the people involved in the project, while the producer secures the funds. A project manager secures the funds for the project, while the producer is in charge of the people involved.

Answers

Answer:

A project manager just oversees the creative element, while a producer oversees the entire project.

It is B

Answer:

b

Explanation:

got it right on the quiz

how big is an iphone xr

Answers

Answer:

the iPhone xr display measure in at 6 .1 inches

the phone measures up to 6.1 in

A computer that supports LoJack technology must have two main components installed. It needs an Application Agent (residing in the OS), which sends tracking signals that enable location and recovery of a stolen device. The other component is a Persistence Module, which restores the Application Agent and allows it to survive reinstallation of an operating system or reformatting of the hard drive. The highest level of security offered by LoJack can be achieved when Persistence Module resides in the:

Answers

Answer: Computer's BIOS

Explanation:

Following the information given in the question, the highest level of security that is offered by LoJack can be achieved when Persistence Module resides in the computer's BIOS.

The BIOS (basic input/output system) refers to the program which the microprocessor of a computer uses in starting the computer system when the computer is powered on. It should also be noted that the BIOS is used in managing the data flow that exist between the operating system of the computer and the attached devices like the keyboard, hard disk, mouse, etc.

A security administrator logs onto a Windows server on her organization's network. Then she runs a vulnerability scan on that server. Which type of scan was conducted in this scenario

Answers

The credentialed scans were scans in which the scanning computer has had an account upon the computer being scanned. It enables the software scanner to run a much more thorough check looking for faults that can also be detected from the network.These are more successful since they have broader access to an organization's network.Its connection reduces the exposure of your critical credentials to potential attackers while enabling your security team to execute critical security evaluations.Therefore, the answer is "credentialed scan".  

Learn more:

credentialed scan: brainly.com/question/14728460

the second generation computer used. as a memory device

Answers

Answer:

The period from 1959-1965 was the second generation. Transistors that are cheaper, consumed less power, were used in this generation, were more compact, were more reliable, and were faster than first-generation vacuum tubing machines.

Explanation:

The primary memories and the magnet tapes and magnetic discs were used as secondary storage equipment in this generation.

The montage language and high programming languages such as FORTRAN, COBOL, have been used in this generation. The computers used batch processing and operating system multi-programming.

A memory is like the brain of human beings. It is used for storing information and instructions. Computer memory is the storage space on the computer that processes data and saves instructions for processing.

The memory is split into many small parts known as cells. There is a unique address for each location or cell, which varies from 0 to memory minus one.

There are three basic types of memory:

Memory Cache

Main Memory/Primary Memory

The Memory of a Second Kind

Express your opinion on whether a successful business analyst can be a good programmer. support your answers with reason

Answers

I think that a successful business analyst could be a good programmer because if they had the write training and experience they could learn about that field of work and become good at programming

A computer is an.............. device.​

Answers

Explanation:

A computer is an electronic device

Answer:

Computers are electronic devices that process information.

In what way, if any, has community building changed in the age of digital media? People’s community building has not changed in the age of digital media. People are now more willing to share highly personal information with strangers. People are now far less interested in building community or connecting with others. People are now more interested in forming communities based on physical location.

Answers

Answer:

People are now more willing to share highly personal information with strangers. Match each type of digital health, wellness, and security with examples of potential violations.

The wiring and connectors that carry the power to a motor must be in good condition. When a connection becomes loose, oxidation of the copper wire occurs. The oxidation ____. A. acts as an electrical resistance and causes the connection to heat more B. has no effect on the electrical connection C. decreases the resistance D. none of the above

Answers

Answer: A. acts as an electrical resistance and causes the connection to heat more.

Explanation:

The wiring and connectors that carry the power to a motor must be in good condition. It should be noted that in a case whereby the connection becomes loose, then the oxidation of the copper wire occurs and thee oxidation will act as an electrical resistance and then results in the connection to heat more.

In such case, this has an effect on the electrical connection and increases the resistance. Therefore, the correct option is A.

what is computer hardware?list any 4 computer hardware​

Answers

The parts of computer which can be touched ,seen and felt are commonly known as computer hardware.
Any 4 computer hardware are:-
1. CPU
2. Motherboard
3. Keyboard
4. Mouse,etc

(e) Give the output of the following:
String n="Computer Knowledge";
String m = "Computer Applications";
System.out.println(n.substring(0,8).concat(m.substring(9)));​

Answers

Answer:

Computer Applications

true

Answer:

Computer Applications

Explanation:

true

Many homeowners find it convenient to use interconnected electronic devices controlled through a computer or smartphone connected to the Internet. However, these interconnected devices can lead to some issues. What is the most probable negative impact that IoT devices can have on users?

Answers

Answer:

The most probable negative impact that IoT devices can have on users is the increase vulnerability of information technology cybersecurity, being that access can be gained into the system through another device connected to an IoT device from which it is theoretically possible to launch malicious computer codes, using both old and present day hacking technologies, due to the different securities, categories and systems of devices connected to the IoT

Explanation:

The negative impacts of Internet of Things IoT devices on users are

1) Loss of privacy 2) Network complexity increase 3) Increase in the dependence on technology 4) Increased unemployment, 5) Lack of compatibility between devices

Write the contribution of Charles Babbage in the history of computer.​

Answers

Answer:

The main contributions of Charles Babbage are;

1 ) He invented difference engine and analytical engine.

2) He gave basic concept of of mathematics in his analytical engine.

3) He also keep the concept of using binary digits in his machine.

4) He had led to the the foundation of modern computer in his analytical engine including the concept of of input, processing and output

Hope it helps.... :)

Which of the following are characteristics of distributed version control systems? Select 3 options.

Developers must be connected to the internet to make changes to the project files.

A full copy of all project files is stored on each developer’s computer.

Project files are maintained in a central repository.

It allows many developers to work on the same project from anywhere at the same time.

The process may require file locking, depending on file type.

Answers

Answer:

Explanation:

Distributed Version Control Systems are a must for any development team. Some of the characteristics of these systems include

Project files are maintained in a central repository.

It allows many developers to work on the same project from anywhere at the same time.

A full copy of all project files is stored on each developer’s computer.

It is somewhat similar to a Centralized Version Control system, with the main difference being that every team developer has a complete project copy in their own system. This allows them to work on the project without access to the internet. Instead, they make changes and update their own server version. This updated version later gets pushed to the centralized server.

Answer:

1. It allows many developers to work on the same project from anywhere at the same time.

2. Project files are maintained in a central repository.

3. A full copy of all project files is stored on each developer’s computer.

Explanation:

i did the assignment

In order for two queries to be UNION-compatible, they must: Select one: A. both have the same number of lines in their SQL statements. B. both output compatible data types for each column and return the same number of rows. C. both return at least one row. D. both return exactly one row.

Answers

Answer: B. both output compatible data types for each column and return the same number of rows.

Explanation:

In order for two queries to be UNION-compatible, they must be both output compatible data types for each column and return the same number of rows.

It should be noted that two relations are union compatible when both relations have the same attributes and also the domain regarding the identical attributes are thesame.

A java program is composed of data members and functions.​
true or false ?

Answers

Answer:

true

Explanation:

Write either True or False. a) Software is touchable part of computer system. b) System software provides easy interaction between user and computer c) Every computer needs to have own operating system. d) A computer can only understand the program written in assembly language. SANJIWANI Computer Book 7​

Answers

Answer:

A: False B: False C: True D: False

Explanation:

Data stored on physical storage devices must do what before the processor can access it? Be converted to binary Be written to the hard drive Go into short-term memory Go from volatile to nonvolatile memory

Answers

Answer:

Go into short-term memory

Explanation:

Data stored on physical storage devices must go into short-term memory before the processor can access it.

This is because, physical storage devices are secondary memory which store information for a long time. The CPU does not work directly with secondary memory but with primary or short term memory. Since the CPU works mainly with short term memory, information in physical storage or secondary memory has to go into short term memory for the CPU to be able to process it.

So, data stored on physical storage devices must go into short-term memory before the processor can access it.

Ben is working in an IT services organization that uses the National Institute of Standards and Technology (NIST) functional impact categories to describe the impact of incidents. During a recent construction project, a contractor plugged a network device to the same switch twice, resulting in a network loop and taking down the organization's network for one-third of its users. Which functional impact category should Ben use to classify the event given in the scenario

Answers

Answer:

Medium

Explanation:

The functional impact category in NCCIC Cyber Incident scoring system considers incident impact to the organization. This category isn't severe and can result from such things as minor network breakdowns in the organization. It is given a priority score according to the scoring system of medium which is yellow in the priority level.

What impact, if any, have advances in technology had on people’s ability to communicate through media? Advances in technology have had no measurable impact on people’s ability to communicate through media. Advances in technology have made it more difficult for people to communicate through media. Advances in technology have made it easier for people to communicate through media. Advances in technology have had made it both easier and more difficult to communicate through media.

Answers

Answer:

What impact, if any, have advances in technology had on people's ability to communicate through media? Advances in technology have made it easier for people to communicate through media.

Answer:

advances in technology made it easier for ppl to communicate through media

Explanation:

because i got it right

A user is configuring an email client application and decides to use the TCP/IP suite protocol that will store all messages on the email server so that they can be synchronized across a laptop, a smartphone, and a web email client. This protocol will store the email messages on the email server until the user explicitly deletes them.Which of the following TCP/IP port numbers will the client application typically use while using this protocol to contact the email server?A. 21B. 80C. 110D. 143

Answers

Answer:

D. 143

Explanation:

A server that allows the entire management of an email account through more than one email client such that the clients the messages of the clients are stored on the server pending being deleted by the user, is an IMAP server

The port that the IMAP server listens to is the port number 143, therefore, the client application typically makes use of port 143 while using the TCP/IP protocol to contact the email server

Using a combination of symmetric and asymmetric key encryption, Sofia sent a report to her home office in Indiana. She received an e-mail acknowledgement that her report had been received, but a few minutes later she received a second e-mail that contained a different hash total than the one associated with her report. This most likely explanation for this result is that

Answers

Group of answer choices.

A) the public key had been compromised.

B) the private key had been compromised.

C) the symmetric encryption key had been compromised.

D) the asymmetric encryption key had been compromised.

Answer:

C) the symmetric encryption key had been compromised.

Explanation:

Cyber security can be defined as preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.

In Cyber security, encryption is a form of cryptography and typically involves the process of converting or encoding informations in plaintext into a code, known as a ciphertext.

Typically, an information or data that has been encrypted can only be accessed and deciphered by an authorized user.

Some examples of encryption algorithms are 3DES, AES, RC4, RC5, and RSA.

Email encryption is the encryption and authentication of an email to protect the message therein from being read by any person other than the intended recipients. Thus, it protects the email from hacking or invasion by a third party.

Basically, when the message is signed with the sender's private key, the receiver can verify its authenticity using the sender's public key.

Also, encrypting the email message with the receiver's public key provides confidentiality.

In this scenario, the most likely explanation for this result is that the symmetric encryption key had been compromised.

What type of operating system is Linux? An outsourced operating system An open source operating system A closed source operating system A variable source operating system

Answers

Answer:

Linux is a free, open source operating system.

Explanation:

Answer:

Linux is an open source operating system (OS). An operating system is the software that directly manages a system's hardware and resources, like CPU, memory, and storage.

Other Questions
Find the first, fourth, and tenth terms of the arithmetic sequence described by the given rule.is it a,b,c or d? The new......... has the capacity of producing 2000 mobile phones a day a. Output b. Design how can you separate mixture of suphur, nacl and nh4cl Sarah wants to print copies of her artwork. At the local print shop, it costs her $1 to make 5 copies and $5 to make 25 copies. What is the constant of proportionality in this direct variation?A. 1/5B. 5C. 1D. 1/25 State five factors that influence soil formation You can run at a speed of 4 mph and swim at a speed of 2 mph and are located on the shore, 6 miles east of an island that is 1 mile north of the shoreline. How far (in mi) should you run west to minimize the time needed to reach the island 2Which is equivalent to 2435?12 Please help me with this question write your answer in simplest radical form 5. Solve each of the following quadratic equations using the Quadratic Formula (Express all roots as integers or as real numbers rounded to one decimal place)a) 2x2 3x - 10 = 0b) 3x2 - 8x + 4 = 0 (answer pls:) A cat that weighs 55 N sits on the top of a cat tree. It is 2 m above a 110 Ndog. How does the mass of the animals relate to the force of gravity onthem?O A. The mass of the 55 N cat will be the same as the mass of the 110N dog after it jumps to the ground.B. The 55 N cat has less mass than the 110 N dog.C. The 55 N cat has the same mass as the 110 N dog when it is inthe cat tree.O D. The mass of the 55 N cat is greater than the mass of the 110 Ndog. which outcome of India's independence movement did Mohandas Gandhinor The historical reasons for the protests against social dance have typically focused onapprehensions of sexual promiscuity and lower-class rebellion, as well as long-standing Protestanttaboos against the which one of the following is a product of an acid base reaction? A. Base B. Acid C. Salt D. Fire Find the number of possible ways one can choose marbles from a bag containing three marbles: a) if the order is important b) if the order is not important. This table shows some college costs. How much more is tuition than the cost of fees and room and board? (table pic attached) Write a program named lastname_firstname_cities.py that works with information about large cities. Your program will open the cities.txt downloadfile. Each line in the file has the name of a city, its country, and its population. The first few lines of the file look like this: 2.Say True or False.(i) The difference between the smallest number of seven digits and the largestnumber of six digits is 10. False(ii) The largest 4-digit number formed by the digits 8, 6, 0, 9 using each digit onlyonce is 9086.IS:).(iii) The total number of 4 digit numbers is 9000. Imagine if you had been in Paul Robeson's shoes. How might you have felt?Why? Which of the following is not one of the methods used for applying overhead?ua.activity-based costing application methodb.multiple production department ratesc.single plantwide application rated.single investment application rate