jf3252r
jf3252r jf3252r
  • 02-01-2022
  • Computers and Technology
contestada

In computer science what are the methods used to protect the information stored by a piece of software called?

Respuesta :

henokaklilu16 henokaklilu16
  • 02-01-2022

Answer:

cryptography

Explanation:

cryptography

In computer science, cryptography refers to secure information and communication techniques derived from mathematical concepts and a set of rule-based calculations called algorithms, to transform messages in ways that are hard to decipher

Answer Link

Otras preguntas

Proof: Given: Isosceles trapezoid TRAP with TR=PA Prove: Angle RTA = angle APR
A laptop computer is priced at $650. If the sales tax is 5%, find the total cost of the computer, including sales tax.
In the step by step simplification of expression below which property is not used? 3(1+x)3(x+1)3(x)+3(1)3x +3  A) associative B) commutative C) distributive D)
Proof: Given: Isosceles trapezoid TRAP with TR=PA Prove: Angle RTA = angle APR
Proof: Given: Isosceles trapezoid TRAP with TR=PA Prove: Angle RTA = angle APR
In the step by step simplification of expression below which property is not used? 3(1+x)3(x+1)3(x)+3(1)3x +3  A) associative B) commutative C) distributive D)
Proof: Given: Isosceles trapezoid TRAP with TR=PA Prove: Angle RTA = angle APR
A laptop computer is priced at $650. If the sales tax is 5%, find the total cost of the computer, including sales tax.
Proof: Given: Isosceles trapezoid TRAP with TR=PA Prove: Angle RTA = angle APR
A laptop computer is priced at $650. If the sales tax is 5%, find the total cost of the computer, including sales tax.