Computer Science, asked by neetujalaniya, 4 months ago

d
D
Unauthorised user cannot read the data in the
security aspect
(a) confidentiality
(b) integrity
(c) authorisation
(d) non-repudiation
60 In.......... data is transferred in coded form
(a) encryption
(b) decryption
(c) Crewall
(d) digital certification
( To convert cipher text to plain text is called.
(a) firewall
(b) digital certificate
(c) decryption
(d) virus
(iv) Which of the following is a fundamental requisite
to ensure safety of personal information?
(a) Confidentiality
(b) Encryption
(C) Integrity
(d) Authenticity
(V) What is a form of electronic signature called?
(a) Certificate
(b) Encryption
(c) Password
(d) Digital signature
(vi) Using ..........encrypted data is decrypted.
(a) digital certificate (b) key
(c) firewall
(d) digital certification
(vii) Which of the following is related to cyberethics?
(a) Ethics in the online environment
(b) Online gaming
(c) Ethics at school
(d) Telecommunications
2
3)
2​

Answers

Answered by Anonymous
0

Answer:

  1. D
  2. C
  3. A
  4. A
  5. B
  6. A
  7. C

Explanation:

hope it will helpful to you

Answered by palakc029
1

Answer:

Did you mean: D Unauthorised user cannot read the data in the security aspect (a) confidentiality (b) integrity (c) authorisation (d) non-repudiation 60 In.......... data is transferred in coded form (a) encryption (b) decryption (c) Crewall (d) digital certification ( To convert cipher text to plain text is called. (a) firewall (b) digital certificate (c) decryption (d) virus (iv) Which of the following is a fundamental requisite to ensure safety of personal information? (a) Confidentiality (b) Encryption (C) Integrity (d) Authenticity (V) What is a form of electronic signature called? (a) Certificate (b) Encryption (c) Password (d) Digital signature (vi) Using ..........encrypted data is decrypted. (a) digital certificate (b) key (c) firewall (d) digital certification (vii) Which of the following is related to cyber ethics? (is) Ethics in the online environment (b) Online gaming (c) Ethics at school (d) Telecommunications 2 3) 2

Similar questions