d
D
Unauthorised user cannot read the data in the
security aspect
(a) confidentiality
(b) integrity
(c) authorisation
(d) non-repudiation
60 In.......... data is transferred in coded form
(a) encryption
(b) decryption
(c) Crewall
(d) digital certification
( To convert cipher text to plain text is called.
(a) firewall
(b) digital certificate
(c) decryption
(d) virus
(iv) Which of the following is a fundamental requisite
to ensure safety of personal information?
(a) Confidentiality
(b) Encryption
(C) Integrity
(d) Authenticity
(V) What is a form of electronic signature called?
(a) Certificate
(b) Encryption
(c) Password
(d) Digital signature
(vi) Using ..........encrypted data is decrypted.
(a) digital certificate (b) key
(c) firewall
(d) digital certification
(vii) Which of the following is related to cyberethics?
(a) Ethics in the online environment
(b) Online gaming
(c) Ethics at school
(d) Telecommunications
2
3)
2
Answers
Answer:
- D
- C
- A
- A
- B
- A
- C
Explanation:
hope it will helpful to you
Answer:
Did you mean: D Unauthorised user cannot read the data in the security aspect (a) confidentiality (b) integrity (c) authorisation (d) non-repudiation 60 In.......... data is transferred in coded form (a) encryption (b) decryption (c) Crewall (d) digital certification ( To convert cipher text to plain text is called. (a) firewall (b) digital certificate (c) decryption (d) virus (iv) Which of the following is a fundamental requisite to ensure safety of personal information? (a) Confidentiality (b) Encryption (C) Integrity (d) Authenticity (V) What is a form of electronic signature called? (a) Certificate (b) Encryption (c) Password (d) Digital signature (vi) Using ..........encrypted data is decrypted. (a) digital certificate (b) key (c) firewall (d) digital certification (vii) Which of the following is related to cyber ethics? (is) Ethics in the online environment (b) Online gaming (c) Ethics at school (d) Telecommunications 2 3) 2