jf3252r
jf3252r jf3252r
  • 02-01-2022
  • Computers and Technology
contestada

In computer science what are the methods used to protect the information stored by a piece of software called?

Respuesta :

henokaklilu16 henokaklilu16
  • 02-01-2022

Answer:

cryptography

Explanation:

cryptography

In computer science, cryptography refers to secure information and communication techniques derived from mathematical concepts and a set of rule-based calculations called algorithms, to transform messages in ways that are hard to decipher

Answer Link

Otras preguntas

An example of ___________ (one word) in art is the good shepherd, a christian symbol that was based on pagan images of apollo, hermes, orpheus, or the personifi
the triangles shown are similar. which side of triangle JGH corresponds to PM of trangle PMO
Write the equation of the line that passes through the points (8, –1) and (2, –5) in standard form, given that the point-slope form is y + 1 = 2/3(x – 8). _____
Which of the following would be an acceptable first step in simplifying the expression sin x/ 1-cos x
Suppose U={1,2,3,4,5,6,7,8} is the universal set and P={2,4,6,8}. Then what is the complement of P?
How to check what devices are connected to my computer?
What is the slope of the line shown?
A bookshelf can hold a maximum of 45 books. Let b represents the number of books to be shelved. Which inequality represents how many books can be put on the she
Write the sentence as an equation. 328 is the quotient of 36 and b FAST
When the volume of a gas is changed from 1145 ml to 765 ml, the temperature will change from ? k to 640 k?