A digital code attached to an electronic message to provide it unique identity is called ………… -Technology

1 Answer

Answer :

A digital code attached to an electronic message to provide it unique identity is calleddigital signature.

Related questions

Description : A digital signature is a. a bit string giving identity of a correspondent b. a unique identification of a sender c. an authentication of an electronic record by tying it uniquely to a key only a sender knows d. an encrypted signature of a sender 

Last Answer : c. an authentication of an electronic record by tying it uniquely to a key only a sender knows

Description : A digital signature is required (i) to tie an electronic message to the sender's identity (ii)for non repudiation of communication by a sender (iii) to prove that a message was sent by the sender in a court of law (iv) in all ... a. i and ii b. i, ii, iii c. i, ii, iii, iv d. ii, iii, iv

Last Answer : b. i, ii, iii

Description : Which of the following attribute should be unique? a) identity b) digital identity c) mashup d) all of the mentioned

Last Answer : digital identity

Description : In __________ transmission, a unique SYNC character is transmitted at the beginning of each message. A. asynchronous B. synchronous C. digital D. analogue

Last Answer : B. synchronous

Description : Point out the wrong statement. a) Distributed transaction systems such as internetworks or cloud computing systems magnify the difficulties faced by identity management systems b) Services that provide digital ... a domain as belonging to a set of assigned addresses d) None of the mentioned

Last Answer : IDaaS Server establishes the identity of a domain as belonging to a set of assigned addresses

Description : After I type a character does it have it's own digital identity?

Last Answer : answer: a is typically represented by the value 97 in the computer, this can be expressed as 61 in hex which is typically how computer scientists talk about these types of values. In binary ... allows for better handling of things like asian characters. UTF-8 is the preferred encoding these days.

Description : Please provide code for this question in Netbeans. -Technology

Last Answer : This answer was deleted by our moderators...

Description : Trademark is the registered ………………… depicting the identity of a product, work or company. -Technology

Last Answer : Trademark is the registered word or text/logo depicting the identity of a product, work or company.

Description : Write a Numpy program to create a 3x3 identity matrix, i.e. diagonal elements are 1, the rest are 0. Replace all 0 to random number from 10 to 20 -Technology

Last Answer : import numpy as nparray1=np.identity(3)print(array1)x=np.where(array1==0)for i in x:array1[x]=np.random.randint(low=10,high=20)print(array1)

Description : Write a Numpy program to create a 3x3 identity matrix, i.e. non diagonal elements are 1, the rest are 0. Replace all 0 to random number from 1 to 10 -Technology

Last Answer : import numpy as npZ = np.arange(9).reshape(3,3)print (Z)x=np.where((Z%2)==0)for i in x:Z[x]=np.random.randint(low=10,high=20)print(Z)

Description : What do you mean by Identity theft? Explain with the help of an example. -Technology

Last Answer : Identity theft is the crime of obtaining the personal or financial information of another person for the sole purpose of assuming that person's name or identity to make transactions or use it to ... using the computer. He used Flex's email account to send inappropriate messages to his contacts.

Description : …………. disk drive must be attached to your computer to play multimedia. -Technology

Last Answer : 100 MBdisk drive must be attached to your computer to play multimedia.

Description : The proper definition of a modern digital computer is A) An electronic automated machine that can solve problems involving words and numbers B) A more sophistic and modified electronic pocket calculator C) Any machine that can perform mathematical operations D) A machine that works on binary code

Last Answer : Answer : A

Description : The proper definition of a modern digital computer is a. An electronic automated machine that can solve problems involving words and numbers b. A more sophistic and modified electronic pocket calculator c. Any machine that can perform mathematical operations d. A machine that works on binary code

Last Answer : A machine that works on binary code

Description : The proper definition of a modern digital computer is a. An electronic automated machine that can solve problems involving words and numbers b. A more sophistic and modified electronic pocket calculator c. Any machine that can perform mathematical operations d. A machine that works on binary code

Last Answer : d. A machine that works on binary code

Description : XMPP creates _________ identity. A. Device B. Email C. Message D. Data

Last Answer : A. Device

Description : XMPP creates _________ identity. A. Device B. Email C. Message D. Data

Last Answer : A. Device 

Description : IP address is given to every computer for its unique identification. -Technology

Last Answer : True An IP address serves two principal functions:1. Host or network interface identification2. Location addressing

Description : Key field is a unique identifier for each record. It is defined in the form of (a) rows (b) columns -Technology

Last Answer : (b) Key is a data item that allows you to uniquely identify individual occurrences which is defined as the column or set of columns.

Description : Write any one similarity and one difference between primary key and unique Constraint. -Technology

Last Answer : Similarity: Column with both the constraints will only take unique values.Difference: Column with Primary key constraints will not be able to hold NULL values while Column with Unique constraints will be able to hold NULL values.

Description : Write any one similarity and one difference between primary key and unique Constraint -Technology

Last Answer : Similarity: Column with both the constraints will only take unique values.Difference: Column with Primary key constraints will not be able to hold NULL values while Column with Unique constraints will be able to hold NULL values.

Description : When a transaction is processed online, how can the merchant verify the customer's identity? a. use secure sockets layers b. use secure electronic transactions c. use electronic data interchange d. use financial electronic data interchange

Last Answer : b. use secure electronic transactions

Description : Can/How do you delete a location attached to an already sent facebook message?

Last Answer : Nope. What’s done is done.

Description : A mail or message sent to a large number of people indiscriminately without their consent is called ..... -Technology

Last Answer : A mail or message sent to a large number of people indiscriminately without their consent is calledspam.

Description : The term Software refers to the set of ________or data a computer processor reads in order to perform a task or operation: a) Electronic Program Instructions b) Planned program instructions

Last Answer : a) Electronic Program Instructions

Description : ……. is an electronic device that manipulates information or data according to the set of instructions called program. -Technology

Last Answer : Computeris an electronic device that manipulates information or data according to the set of instructions called program.

Description : An electronic page in a presentation is called ……………….. -Technology

Last Answer : An electronic page in a presentation is called slide

Description : Discuss the structure of an E_mail message. -Technology

Last Answer : In an E-mail message, you will see the following fields which are as follows: To Mail-id of a recipient. Cc (Carbon copy) It allows you to send the same mail message to multiple recipients at ... Send button Once you complete the E-mail message, click at Send button to send the E-mail message.

Description : Create XML markup to represent a message sent on 7 June, 2014 to Amit and Saurabh by Mohit. -Technology

Last Answer : Mohit Amit Saurabh Submitted Successfully

Description : What are the two distinct stages of message transmission in the two step flow theory? -Technology

Last Answer : The Two Step Flow theory proposed by Paul Lazarsfeld, states that messages from the media get transmitted in two distinct stages:1. Through Opinion Leaders who pay close attention to the mass ... 2. These opinion leaders then pass their own interpretations in addition to the actual media content.

Description : Touch screen is an electronic ……….. display that can detect the presence and location of a touch within the display area. -Technology

Last Answer : Touch screen is an electronic visual display that can detect the presence and location of a touch within the display area.

Description : ……. services typically include reviewing account activity and balance, sending electronic payments -Technology

Last Answer : (a) E-banking provides all transactional and non-transactional activities.

Description : It is an electronic messaging system used by various commercial organisations to send bulk -Technology

Last Answer : 2. Spaman electronic messaging system used by various commercialorganizations to send bulk messages to a large number of E-mail addresses.

Description : The electronic equivalent of junk mail is known as (a) adware -Technology

Last Answer : (c) Spam is an electronic equivalent of junk mail.

Description : Write down the significance of electronic spreadsheets. -Technology

Last Answer : Using electronic spreadsheets, a large volume of data can be stored in worksheets. Worksheets can be managed, edited, viewed, retrieved and printed easily in the desired format. Electronic spreadsheets support charts, which represent data pictorially.

Description : What are the various ethical concerns that originate with the use of electronic text, multimedia sharing, and other on line resources? -Technology

Last Answer : a. Digital material are prone to be misused easilyb. Ethical practices necessitate that the use of any digital materials, multimedia or online material be done as per the law of the landc. ... digital, multimedia or online resources of public domain is punishable offence, hence should be avoided.

Description : Name the primary law in India dealing with cyber crime and electronic commerce. -Technology

Last Answer : The primary law is Information Technology Act 2000.

Description : According to a survey, one of the major asian country generates approximately about 2 million tonnes of electronic waste per year. -Technology

Last Answer : Buy environmentally friendly electronicsDonate used electronics to social programsReuse, refurbish electronicsRecycling e-waste

Description : Which is/are the main provisions of Information Technology (IT) Act, 2000? 1) Finalisation of contracts through electronic media. 2) Legal recognition to digital signatures and documents. 3) Making hacking with computer system an office. 4) All of the above

Last Answer : 4) All of the above

Description : How To Protect Your Digital Identity?

Last Answer : With the rise in the population of using the internet raises, so do the security risks associated with it.Cyberthreats have turned out to be a major fear that countries have designated ... With the development of technology, there are various options to protect your identity and personal data.

Last Answer : : About 20,000 old trees in the Mount Tai area of Shandong Province in eastern China now have digital ID cards.

Description : What are plastic cards the size of a credit card that contains an embedded chief on which digital information can be stored? a) Customer relationship management system cards b) E-government identity cards c) FEDI cards d) Smart cards

Last Answer : d) Smart cards

Description : What are plastic cards the size of a credit card that contains an embedded chip on which digital information can be stored? a. Customer relationship management systems cards b. E-government identity cards c. FEDI cards d. Smart cards

Last Answer : d. Smart cards

Description : What are plastic cards the size of a credit card that contains an embedded chip on which digital information can be stored? a. Customer relationship management systems cards b. E-government identity cards c. FEDI cards d. Smart cards

Last Answer : d. Smart cards

Description : MIDI stands for: a) Memory in Digital Interface b) Musical Instructions and Digital Inteface c) Mouse Identity Development Interface d) Musical Instrument Digital Interface e) None of These

Last Answer : d) Musical Instrument Digital Interface

Description : What are plastic cards the size of a credit card that contains an embedded chip on which digital information can be stored? a. Customer relationship management systems cards b. E‐government identity cards c. FEDI cards d. Smart cards

Last Answer : d. Smart cards

Description : A method of marketing by electronic mail wherein the recipient of the message has consented to receive it is called:  Search Marketing  Internet Advertising  Permission-based E-Mail marketing  Social Web Marketing

Last Answer :  Permission-based E-Mail marketing

Description : How attached are you to your cell phone? (or other gadget)

Last Answer : I’m ridiculously attached to my iPhone. The whole being late/driving miles out of the way to ‘get something I forgot’...know all about that. Losing the phone is the worst. I could barely get out of bed. I need to throw it in a river and go sleep under a pine tree.

Description : What are these balls on chains attached to IDF's Merkivah tanks?

Last Answer : Deez Nuts?

Description : Modern handheld digital tachometers operate by counting light pulses returned to the unit by ______________. A. the tach generator B. either the coupling or shaft C. a small bulb attached to the shaft D. a piece of reflective tape

Last Answer : Answer: D