________ is the use of mathematical operations to protect messages travelling between parties or stored on a computer
A) Cryptography
B) Encryption
C) Authentication
D) Confidentiality
Answer: A
Business
You might also like to view...
Which of the following sources would most likely be responsible for persistent "project cost over-runs"?
A) rapidly rising inflation B) delays in obtaining contracts and permits C) forecasting bias by the sponsoring manager D) lack of raw materials
Business
You work for a company that produces and markets apparel for men and women, and is planning to enter the Chinese market. If you were asked if the company should opt for a straight extension or a product adaptation, what would you choose, and why?
What will be an ideal response?
Business