Computer Applications
Which of the following techniques can be used for security of data ?
- Authentication
- Authorisation
- Encryption
- All of the Above
Computing Safety & Ethics
3 Likes
Answer
All of the Above
Reason — Authentication, authorisation and encryption techniques can be used for security of data.
Answered By
3 Likes
Related Questions
A …………… is an economic and social inequality with regard to access to, use of, or impact of ICT.
- Digital inequality
- Difference of services
- Digital divide
- Differential divide
Preeti needs to send a very confidential message to her colleague in office over a secure channel. She uses a technique wherein an actual message (which is in readable form) can be converted into an unreadable message. This concept is known as ……………. .
- Encryption
- Decryption
- Plagiarism
- Data Security
Which of the following is not a cybercrime ?
- Plagiarism
- Phishing
- Using licensed software
- Hacking
Secure data transmission means :
- Data is accessible by any unauthorized person during transmission.
- Data cannot be accessed by any unauthorized person during transmission.
- Transmission of data happens easily
- No one can access it