FUNDAMENTALS OF COMPUTER

TELECOMMUNICATIONS SYSTEMS

TYPES OF NETWORKS

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Encryption
A
Changing data so that it can no longer be understood without a decryption(decode) key
B
someone at your own level
C
he “peers” are computer systems which are connected to each other via the Internet. Files can be shared directly between systems on the network without the need of a central server.
D
a powerful computer which provides services required by any of the clients (computers on the network)
Explanation: 

Detailed explanation-1: -Symmetric, or secret key encryption, uses a single key for both encryption and decryption. Symmetric key encryption is used for encrypting large amounts of data efficiently. 256-bit AES keys are symmetric keys. Asymmetric, or public/private encryption, uses a pair of keys.

Detailed explanation-2: -In theory, encryption should be unbreakable, as long as the key used to encrypt the information is kept secret. However, in practice, encryption can be broken if someone is able to find a weakness in the encryption algorithm, or if they are able to obtain the key through some other means.

Detailed explanation-3: -In asymmetric, or public key, encryption, there are two keys: one key is used for encryption, and a different key is used for decryption.

Detailed explanation-4: -Encrypted data is commonly referred to as ciphertext, while unencrypted data is called plaintext.

There is 1 question to complete.