Discover
Questions library
Collections library
Find online teacher
login
Discover
questions library
Find online teacher
login
Popular searches:
if-else
class-diagram
flowchart
Polymorphism
Home
Questions
Questions
Study lists
Mohamad Eskandarane Questions
11022 Questions
A process of making the encrypted text readable again
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
432
An algorithm used in encryption is referred to as cipher
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
422
The process of transforming plain text to unreadable text
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
466
The Data Encryption Standard (DES) was designed by
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
448
RSA stands for
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
460
The shift cipheris sometimes referred to as the
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
437
The Cryptography can provide
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
424
The cipher which uses the exclusive-or operation as defined in computer science is called
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
424
ECB stands for
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
447
The Advanced Encryption Standard (AES) was designed
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
438
In Cryptography, when text is treated at the bit level, each character is replaced by
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
473
The cipher feedback (CFB) mode was created for those situations in which we need to send or receive r bits of
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
405
A transposition cipher reorders (permutes) symbols in aa
Networks
2022-06-01
Answers
30
Question
40
Followers
30
1
1
676
Total:
11022
Previous
590
591
592
593
594
Next
Go