Discover
Questions library
Collections library
Find online teacher
login
Discover
questions library
Find online teacher
login
Popular searches:
if-else
class-diagram
flowchart
Polymorphism
Home
Questions
Questions
Study lists
Mohamad Eskandarane Questions
11022 Questions
A process of making the encrypted text readable again
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
466
An algorithm used in encryption is referred to as cipher
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
455
The process of transforming plain text to unreadable text
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
519
The Data Encryption Standard (DES) was designed by
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
487
RSA stands for
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
491
The shift cipheris sometimes referred to as the
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
468
The Cryptography can provide
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
454
The cipher which uses the exclusive-or operation as defined in computer science is called
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
473
ECB stands for
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
478
The Advanced Encryption Standard (AES) was designed
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
486
In Cryptography, when text is treated at the bit level, each character is replaced by
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
507
The cipher feedback (CFB) mode was created for those situations in which we need to send or receive r bits of
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
437
A transposition cipher reorders (permutes) symbols in aa
Networks
2022-06-01
Answers
30
Question
40
Followers
30
1
1
767
Total:
11022
Previous
590
591
592
593
594
Next
Go