BuyFindarrow_forward

Enhanced Discovering Computers 201...

1st Edition
Misty E. Vermaat + 4 others
Publisher: Cengage Learning
ISBN: 9781305657458

Solutions

Chapter
Section
BuyFindarrow_forward

Enhanced Discovering Computers 201...

1st Edition
Misty E. Vermaat + 4 others
Publisher: Cengage Learning
ISBN: 9781305657458
Chapter 5, Problem 29SG
Textbook Problem
1 views

Unencrypted data is called ___; encrypted data is called ___.

Program Description Answer

The readable data, which are unencrypted data, are referred as plaintext and the encoded data or encrypted data are referred as ciphertext.

Hence, the correct answer is “Plaintext” and “Ciphertext”.

Explanation of Solution

Plaintext and ciphertext:

  • In the encryption process, the readable data or unencoded data are known as plaintext. That is, user can easily read that data.
  • In the decryption process, the scrambled data or encoded data are known as ciphertext...

Still sussing out bartleby?

Check out a sample textbook solution.

See a sample solution

The Solution to Your Study Problems

Bartleby provides explanations to thousands of textbook problems written by our experts, many with advanced degrees!

Get Started

Chapter 5 Solutions

Enhanced Discovering Computers 2017 (Shelly Cashman Series) (MindTap Course List)
Show all chapter solutions
add
Ch. 5 - Define the terms, firewall and proxy server. List...Ch. 5 - Give examples of unauthorized access and use of a...Ch. 5 - Identify what an AUP should specify. Why might you...Ch. 5 - Explain how an organization uses access controls...Ch. 5 - Differentiate among user names, passwords,...Ch. 5 - List tips for using a password manager safely.Ch. 5 - What is a single sign on account? PIN stands for...Ch. 5 - Describe the purpose of a CAPTCHA.Ch. 5 - Define the terms, possessed objects and biometric...Ch. 5 - What is the purpose of a lock screen?Ch. 5 - Describe how companies use the following...Ch. 5 - Explain the two-step verification process.Ch. 5 - Define the term, digital forensics. Name areas in...Ch. 5 - Define the terms, software theft, keygen, and...Ch. 5 - Explain the process of product activation.Ch. 5 - Describe the following license agreement types:...Ch. 5 - Give examples of information theft. How can you...Ch. 5 - Describe the functions of an encryption algorithm...Ch. 5 - Unencrypted data is called ___; encrypted data is...Ch. 5 - Describe the purpose of a VPN.Ch. 5 - Define these terms: digital signature, digital...Ch. 5 - List concerns and responsibilities regarding cloud...Ch. 5 - Describe what occurs during hardware theft or...Ch. 5 - Define the terms, backup and restore.Ch. 5 - List six types of backups. Describe the...Ch. 5 - Identify the components of a disaster recovery...Ch. 5 - Describe security risks associated with wireless...Ch. 5 - List guidelines to protect your mobile device...Ch. 5 - Describe technology ethics, information accuracy,...Ch. 5 - Describe issues surrounding inaccurate data.Ch. 5 - List measures users can take to contribute to...Ch. 5 - Explain how companies, websites, and employers...Ch. 5 - Describe how the following techniques are used to...Ch. 5 - How can you protect against phishing scams?Ch. 5 - Identify methods to protect yourself from social...Ch. 5 - List examples of privacy laws. Should you be able...Ch. 5 - Describe what a company might track when...Ch. 5 - Define and identify issues surrounding content and...Ch. 5 - Describe uses of technology in the national and...Ch. 5 - Any illegal act involving the use of a computer or...Ch. 5 - A rootkit displays an online advertisement in a...Ch. 5 - Viruses, worms, and other malware can be hidden in...Ch. 5 - Ail audit trail records in a file both successful...Ch. 5 - It is good practice to change your password...Ch. 5 - Intentionally erasing software would be considered...Ch. 5 - A typical license agreement allows you to rent or...Ch. 5 - Unencrypted, readable data is called ciphertext.Ch. 5 - Private key encryption also is called asymmetric...Ch. 5 - VPNs encrypt data to help ensure that the data is...Ch. 5 - When data is traveling to or from a computer to a...Ch. 5 - A good practice to secure your wireless network is...Ch. 5 - A _____ is someone who demands payment to stop an...Ch. 5 - _____ is a program that hides in a computer or...Ch. 5 - A ___________ is a program or set of instructions...Ch. 5 - An employee using an organizations computer to...Ch. 5 - A _____ is a private combination of words, often...Ch. 5 - A(n) ________ is a set of characters that the...Ch. 5 - A(n) _________ backup method is the only real-time...Ch. 5 - Online shopping websites generally use a...Ch. 5 - script kiddie a. compromised computer or device...Ch. 5 - zombie a. compromised computer or device whose...Ch. 5 - bot a. compromised computer or device whose owner...Ch. 5 - spoofing a. compromised computer or device whose...Ch. 5 - access control a. compromised computer or device...Ch. 5 - keygen a. compromised computer or device whose...Ch. 5 - digital certificate a. compromised computer or...Ch. 5 - technology ethics a. compromised computer or...Ch. 5 - digital rights management a. compromised computer...Ch. 5 - cookie a. compromised computer or device whose...Ch. 5 - What are some common digital security risks?Ch. 5 - How does a hacker differ from a cracker?Ch. 5 - What is cyberwarfare?Ch. 5 - What is a hacktivist?Ch. 5 - How does malware deliver its payload?Ch. 5 - What is a botnet?Ch. 5 - What practices should gamers follow to increase...Ch. 5 - What is the purpose of a DoS attack?Ch. 5 - Why would a programmer or computer repair...Ch. 5 - How is email spoofing commonly used?Ch. 5 - What are methods to protect computers, mobile...Ch. 5 - Who would an organization requiring assistance or...Ch. 5 - What screening techniques do proxy servers use?Ch. 5 - How does unauthorized access differ from...Ch. 5 - What is a single sign-on account?Ch. 5 - What is a password manager?Ch. 5 - Are passphrases more secure than passwords? Why or...Ch. 5 - How are fingerprint readers used with personal...Ch. 5 - What conditions are found in a typical single-user...Ch. 5 - Who issues digital certificates? (231)Ch. 5 - What is meant by a three-generation backup policy?Ch. 5 - What should you include in a disaster recovery...Ch. 5 - What steps can you take to secure your wireless...Ch. 5 - How can mobile security apps protect your mobile...Ch. 5 - What are some questions that arise surrounding...Ch. 5 - What role does the ENERGY STAR program play in...Ch. 5 - For what purposes do websites use cookies? (243)Ch. 5 - What is clickjacking?Ch. 5 - No Browsing History While using the browser on...Ch. 5 - Phishing Scam You just received an email message...Ch. 5 - Suspicious File Attachment You receive an email...Ch. 5 - Antivirus Software Outdated After starting your...Ch. 5 - Laptops Physical Security You plan to start taking...Ch. 5 - Corporate Firewall Interference You installed a...Ch. 5 - Problems with CAPTCHA You are signing up for an...Ch. 5 - Unclear Acceptable Use Policy You read your...Ch. 5 - Two-Step Verification Problem A website you are...Ch. 5 - Issue with Virus Protection You receive a...Ch. 5 - Technology in National and Local Security National...Ch. 5 - What personal information have you uncovered...Ch. 5 - What additional steps can you take to prevent...Ch. 5 - What steps might you be able to take if you are...Ch. 5 - What antivirus program, if any, currently is...Ch. 5 - In addition to downloading and installing virus...Ch. 5 - In addition to keeping the antivirus programs...Ch. 5 - What additional ways can you properly secure your...Ch. 5 - What are some reasons why you might want to delete...Ch. 5 - Can you configure your browser to automatically...Ch. 5 - What are the advantages of keeping your browsing...Ch. 5 - What is the difference between first-party cookies...Ch. 5 - Configure the browser to deny all first-party and...Ch. 5 - What security risks are associated with cookies?Ch. 5 - Making Use of the Web News, Weather, and Sports...Ch. 5 - Social Media Sharing photos on your social media...Ch. 5 - Search Skills Social Media Search Search engines...Ch. 5 - Security Digital certificates and signatures...Ch. 5 - Cloud Services Cloud Security (SecaaS) Antivirus...Ch. 5 - Online Gaming Safety You and your friend...Ch. 5 - Ensuring Safety and Security Online You work in...Ch. 5 - Case Study Amateur Sports League You are the new...Ch. 5 - Implementing Biometric Security You are the chief...

Additional Engineering Textbook Solutions

Find more solutions based on key concepts
Show solutions add
Create the ERD to show the relationships among EMPLOYEE, BENEFIT, JOB, and PLAN.

Database Systems: Design, Implementation, & Management

5. Identify the main components of an information system. What is a mission-critical system?

Systems Analysis and Design (Shelly Cashman Series) (MindTap Course List)

How are problems normally first noticed with the differential and drive axles?

Automotive Technology: A Systems Approach (MindTap Course List)

What is meant by the phrase consumerization of IT?

Principles of Information Systems (MindTap Course List)

What code is used to cancel automatic cutter radius compensation?

Precision Machining Technology (MindTap Course List)

Using Excel, create a table that shows the relationship between the units of power in watts and horsepower in t...

Engineering Fundamentals: An Introduction to Engineering (MindTap Course List)

If your motherboard supports ECC DDR3 memory, can you substitute non-ECC DDR3 memory?

A+ Guide to Hardware (Standalone Book) (MindTap Course List)

How far away should highly combustible materials be from any welding or cutting?

Welding: Principles and Applications (MindTap Course List)