________ is the use of mathematical operations to protect messages travelling between parties or stored on a computer

A) Cryptography
B) Encryption
C) Authentication
D) Confidentiality

Answer: A

Business

You might also like to view...

Which of the following sources would most likely be responsible for persistent "project cost over-runs"?

A) rapidly rising inflation B) delays in obtaining contracts and permits C) forecasting bias by the sponsoring manager D) lack of raw materials

Business

You work for a company that produces and markets apparel for men and women, and is planning to enter the Chinese market. If you were asked if the company should opt for a straight extension or a product adaptation, what would you choose, and why?

What will be an ideal response?

Business