Discover
Questions library
Collections library
Find online teacher
login
Discover
questions library
Find online teacher
login
Popular searches:
if-else
class-diagram
flowchart
Polymorphism
Home
Questions
Questions
Study lists
Mohamad Eskandarane Questions
11022 Questions
A process of making the encrypted text readable again
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
469
An algorithm used in encryption is referred to as cipher
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
464
The process of transforming plain text to unreadable text
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
523
The Data Encryption Standard (DES) was designed by
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
490
RSA stands for
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
497
The shift cipheris sometimes referred to as the
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
478
The Cryptography can provide
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
459
The cipher which uses the exclusive-or operation as defined in computer science is called
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
477
ECB stands for
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
484
The Advanced Encryption Standard (AES) was designed
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
494
In Cryptography, when text is treated at the bit level, each character is replaced by
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
510
The cipher feedback (CFB) mode was created for those situations in which we need to send or receive r bits of
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
442
A transposition cipher reorders (permutes) symbols in aa
Networks
2022-06-01
Answers
30
Question
40
Followers
30
1
1
777
Total:
11022
Previous
590
591
592
593
594
Next
Go