Computer Science, asked by neetujalaniya, 2 months ago

Unauthorised user cannot read the data in the
security aspect
(a) confidentiality
(b) integrity
(c) authorisation
(d) non-repudiation
(1) In.......... data is transferred in coded form
(a) encryption
(b) decryption
(c) firewall
(d) digital certification
(ii) To convert cipher text to plain text is called
(a) firewall
(b) digital certificate
(c) decryption
(d) virus
(iv) Which of the following is a fundamental requisite
to ensure safety of personal information?
(a) Confidentiality
(b) Encryption
(c) Integrity
(d) Authenticity
(v) What is a form of electronic signature called?
(a) Certificate
(b) Encryption
(c) Password
(d) Digital signature
(vi) Using ..........encrypted data is decrypted.
(a) digital certificate (b) key
(c) firewall
(d) digital certification
(vii) Which of the following is related to cyberethics?
(a) Ethics in the online environment
(b) Online gaming
(c) Ethics at school
(d) Telecommunications
Ce​

Answers

Answered by Anonymous
3

Answer:

  1. C
  2. A
  3. B
  4. D
  5. D
  6. B
  7. A

Explanation:

hope it will helpful to you

Similar questions