When information is transformed from a useful form of understanding to an
opaque form of understanding, this is called:
a) Encryption
b) Decryption
c) Both of Above
d) None of These

1 Answer

Answer :

a) Encryption

Related questions

Description : When information is transformed from a useful form of understanding to an opaque form of understanding, this is called: a) Encryption b) Decryption c) Both of Above d) None of These

Last Answer : c) Both of Above

Description : When the information is reverted back into a useful form it is called: a) Standard encryption b) Plain text encryption c) Decryption d) None of These

Last Answer : c) Decryption

Description : When the information is reverted back into a useful form it is called: a) Standard encryption b) Plain text encryption c) Decryption d) None of These

Last Answer : c) Decryption

Description : Which of the following is a useful security mechanism when considering business strategy and IT? a. Encryption b. Decryption c. firewall d. all the above

Last Answer : d. all the above

Description : Which of the following is a useful security mechanism when considering business strategy and IT? a. encryption b. decryption c. firewall d. all the above

Last Answer : d. all the above

Description : Symmetric - key cryptography refers to ______methods in which both the sender and receiver share the same key ( or , less commonly, in which their keys are different but related in an easily computable way): a) Encryption b) Decryption c) Both of above d) None of These

Last Answer : a) Encryption

Description : Symmetric - key cryptography refers to ______methods in which both the sender and receiver share the same key ( or , less commonly, in which their keys are different but related in an easily computable way): a) Encryption b) Decryption c) Both of above d) None of These

Last Answer : a) Encryption

Description : By symmetric key encryption we mean a. one private key is used for both encryption and decryption b. private and public key used are symmetric c. only public keys are used for encryption d. only symmetric key is used for encryption

Last Answer : D

Description : Find the false statement: (A) In Modern Cryptography, symmetric key algorithms use same key both for Encryption and Decryption. (B) The Symmetric cipher DES (Data Encryption Standard) was widely used ... and 124 bits. (D) Public key algorithms use two different keys for Encryption and Decryption.

Last Answer : (C) The AES (Advanced Encryption Standard) cryptosystem allows variable key lengths of size 56 bits and 124 bits.

Description : The study of encryption is called‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐ a. Decryption b. Cryptography c. Firewall d. All the above

Last Answer : b. Cryptography

Description : Public key encryption uses multiple keys. One key is used to encrypt data, while another is used to decrypt data. The key used to encrypt data is called the _____ key, while the key used to ... the _____ key. a. encryption, decryption b. private, public c. encryption, public d. public, private

Last Answer : d. public, private

Description : Explain encryption and decryption. -Technology

Last Answer : A process to convert a plain text into cipher text is called encryption. Whereas, a process to convert a cipher text into plain text is called decryption.

Description : Encoding or scrambling data for transmission across a network is khown as a)Protection b) Detection c) Encryption d) Decryption

Last Answer : c) Encryption

Description : Encryption and decryption are functions of which layer? a. transport b. session c. application d. presentation

Last Answer : d. presentation

Description : NAT limits the use of ………………….. and ……………… A. encryption, authentication. B. encryption, decryption C. encapsulation, translation D. authentication, verification

Last Answer : A. encryption, authentication.

Description : Transmission media are usually categorized as . a. Guided or Unguided b. Determinate or Indeterminate c. Fixed or Unfixed d. Encryption or Decryption

Last Answer : a. Guided or Unguided

Description : What scrambles the contents of a file so you can't read it without having the right decryption key? a. Encryption b. Intrusion‐detection software c. Security‐auditing software d. All of the above

Last Answer : a. Encryption

Description : Which of the following is not related to security mechanism a. encryption b. decryption c. e‐cash d. all the above

Last Answer : c. e‐cash

Description : Encoding or scrambling data for transmission across a network is known as: (A) Decryption (B) Protection (C) Detection (D) Encryption

Last Answer : (D) Encryption

Description : Encryption and Decryption is the responsibility of ............... Layer. (A) Physical (B) Network (C) Application (D) Datalink

Last Answer : (C) Application

Description : If there are N people in the world and are using secret key encryption/decryption for privacy purpose, then number of secret keys required will be: (A) N (B) (N-1) (C) N(N-1)/2 (D) N(N+1)/2

Last Answer : (C) N(N-1)/2 

Description : Which of the following is a useful security mechanism when considering business strategy and IT? a. Encryptionb. Decryption c. firewall d. all the above

Last Answer : d. all the above

Description : Which among the following layer' main function is data formats, data encryption/decryption, data compression/decompression etc: a) Session Layer b) Transport Layer c) Presentation Layer d) None of These

Last Answer : c) Presentation Layer

Description : Data encryption techniquesare particularly useful for A. reducingstorage space requirements B. improving data integrity C. protecting data indata communication systems D. All of theabove E. None of the above

Last Answer : protecting data indata communication systems

Description : In buyer decision process, the stage in which the purchase intention is transformed in to purchase decision is called A. need recognition B. information search C. purchase decision D. both b and c

Last Answer : C. purchase decision

Description : stage in which purchase intention is transformed in to purchase decision is called A.need recognition B.information search C.purchase decision D.both b and c Answer: C

Last Answer : C.purchase decision

Description : Which of the following is generally considered as opaque surface towards radiations? (A) Gases (B) Solids (C) Liquids (D) Both (B) and (C)

Last Answer : (D) Both (B) and (C)

Description : In the United Kingdom, the Regulation of Investigatory Powers Act gives UK police the powers to force suspects to _____that protect encryption keys: a) Hand over passwords b) Decrypt Files c) Both of Above d) None of These

Last Answer : c) Both of Above

Description : In the United Kingdom, the Regulation of Investigatory Powers Act gives UK police the powers to force suspects to _____that protect encryption keys: a) Hand over passwords b) Decrypt Files c) Both of Above d) None of These

Last Answer : c) Both of Above

Description : A USB communication device that supports data encryption for secure wireless communication for notebook users is called a a) USB wireless network adapter b) wireless switch c) wireless hub d) router e) None of these

Last Answer : a) USB wireless network adapter

Description : On the upper layer of SSL, a protocol for initial authentication and transfer of encryption keys, called the ………………… A) SSL handshake protocol B) SSL authentication protocol

Last Answer : A) SSL handshake protocol

Description : Where can I find a small, opaque, hermetically sealed jar?

Last Answer : Do you really mean hermetically sealed, or do you just mean stoppered?

Description : Why do the opaque gummies always taste better?

Last Answer : This is such a shallow question, I can see right through it ;¬} Oh & yeah, I happen to agree.

Description : When I shoot tap water at home, it's opaque for a while and it's transparent after a while, is that normal?

Last Answer : Yes, it is completely normal for water networks. You don't have to worry.

Description : When I put a flower in a transparent container, it won't grow?

Last Answer : I also grew peppers in a transparent pot and there is no problem with that. ;-)

Description : Which of the following is opaque?

Last Answer : Which of the following is opaque? A. Water B. Glass C. Mirror D. Prism

Description : Is a diamond opaque?

Last Answer : What is the answer ?

Description : Is a tv opaque?

Last Answer : Need answer

Description : When light strikes an opaque material accurately describes what happens to the light rays?

Last Answer : Need answer

Description : Can fiber optic cable be used for transmitting light from a source to another point around the opaque object?

Last Answer : Fiber Optic is normally used for carrying data as light; I doubt it'd be useful for actually transmitting coherent light.

Description : A ray of white light strikes the surface of an object. If all the colours are reflected, the surface would appear (1) Black (2) White (3) Grey (4) Opaque

Last Answer : (2) White Explanation: Objects do not have any colour of their own. When light hits a surface, some of it is absorbed and some of it is reflected. The light that is reflected is ... appear white when they reflect all the wavelengths; they appear black when they absorb all visible wavelengths.

Description : The sum of reflectivity and absorptivity for an opaque body is equal to (A) 0.5 (B) 1 (C) 0 (D) 2

Last Answer : (B) 1

Description : The dwarfing gene in rice is: (A) Opaque – 2 (B) Tift – 23 A (C) Dee – Gee – Woo – Gen (D) Norin -10

Last Answer : (C) Dee – Gee – Woo – Gen

Description : The message in pub/sub is an opaque blob of ________ a) Bits b) Bytes c) Word d) Nibble

Last Answer : Bytes

Description : Maximum amount of thermal radiation is emitted at all wavelengths at any specified temperature by a/an __________ body. (A) Grey (B) Black (C) Opaque

Last Answer : (A) Grey

Description : For sanitary pipes and chemical stonewares, (A) Salt glazing is used (B) Lead glazing is used (C) Opaque glazing is used (D) None of these

Last Answer : Answer: Option A

Description : “Pop off” of a porcelain veneer from the under the lying gold crown is due to:** A. Too thick application of pure gold surface conditioner B. Contamination at the porcelain metal interface C. Under firing the opaque layer D. All of the above

Last Answer : B. Contamination at the porcelain metal interface

Description : When should metallic framework not be contaminated during the fabrication of a porcelain fused to metal crown: A. Between bisque stage and glazing stage B. Between preheat and opaque stages C. Between opaque and bisque stages D. Between one opaque and two opaque stages

Last Answer : B. Between preheat and opaque stages

Description : Porcelain must not be contaminated by handling between which two stages: A. Pre-soldering and heat treatment B. Heat treatment and opaque /bake/ stages C. Opaque and bisque stages D. Bisque and glazing stages E. First opaque bake and second opaque bake

Last Answer : A. Pre-soldering and heat treatment

Description : What is NOT characteristic of root canal filing materials (“obturation material”) A. Tacky adhesive to walls B. Radio opaque C. Not irritating D. Quick in setting

Last Answer : D. Quick in setting