COMPUTER FUNDAMENTALS

COMPUTER ETHICS AND SECURITY

ETHICS IN COMPUTING

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
The process of coding information to make it unreadable except to those who have a special piece of information known as a key.
A
Restriction
B
Protection
C
Encryption
D
Prevention
Explanation: 

Detailed explanation-1: -"Encryptionā€¯ is a term used to describe when information is transformed into an unreadable format unless the reader possesses the appropriate key for decryption.

Detailed explanation-2: -Today, encryption technology uses advanced algorithms to make data unreadable except by those with the correct key. Encryption is a must for businesses protecting sensitive information, such as customer credit card information or government issued data.

Detailed explanation-3: -Encryption Technology is the coding or scrambling of information so that it can only be decoded and read by someone who has the correct decoding key.

Detailed explanation-4: -Phishing is when scam artists send official-looking emails, attempting to fool you into disclosing your personal information-such as user names, passwords, banking records or account numbers, or social security numbers-by replying to the email or entering it on a phone website.

There is 1 question to complete.