OPERATING SYSTEMS FOR COMPUTERS
COMPUTER OPERATING SYSTEMS
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
a and b only
|
|
c and d only
|
|
b and d only
|
|
a and c only
|
Detailed explanation-1: -Once a device is encrypted, all user-created data is automatically encrypted before committing it to disk and all reads automatically decrypt data before returning it to the calling process. Encryption ensures that even if an unauthorized party tries to access the data, they won’t be able to read it.
Detailed explanation-2: -File encryption protects against the threat of lost or stolen mobile devices. Each file on the machine is encrypted, and the encryption keys are stored protected by the user’s password. If an attacker doesn’t have access to this password, then they can’t read any useful data off of the stolen device.
Detailed explanation-3: -Homomorphic encryption is a form of encryption with an additional evaluation capability for computing over encrypted data without access to the secret key.