Data Encryption Techniques are particularly used for _______.


protecting data in Data Communication System


reduce Storage Space Requirement


enhances Data Integrity


decreases Data Integrity

Answer: (a).protecting data in Data Communication System

Engage with the Community - Add Your Comment

Confused About the Answer? Ask for Details Here.

Know the Explanation? Add it Here.

Q. Data Encryption Techniques are particularly used for _______.

Similar Questions

Discover Related MCQs

Q. An example of a layer that is absent in broadcast networks is:

Q. The ATM cell is

Q. The technique of temporarily delaying outgoing acknowledgements so that they can be hooked onto the next outgoing data frame is known as

Q. Using RSA algorithm, what is the value of cipher text C, if the plain text
M = 5 and p = 3, q = 11 & d = 7 ?

Q. Match the following : 

List – I                                         List – II 
a. Application layer                  1. TCP 
b. Transport layer                    2. HDLC 
c. Network layer                       3. HTTP 
d. Data link layer                     4. BGP 

Codes : a b c d 

Q. In classful addressing, an IP address belongs to ______ class format.

Q. Match the following with respect to the Mobile Computing Architecture.

a. Downlink control                                      1. 100 Mbps
b. Radio communication data rate              2. Residency latency (RL)
c. The average duration
of user’s stay in cell                                     3. Sending data from a BS to MD
d. FDDI bandwidth                                       4. 2-Mbps

Codes : a b c d

Q. When data and acknowledgement are sent in the same frame, this is called as

Q. Encryption and Decryption is the responsibility of ___ Layer.

Q. An analog signal carries 4 bits in each signal unit. If 1000 signal units are sent per second, then baud rate and bit rate of the signal are ________  and ____________

Q. The VLF and LF bauds use propagation for communication

Q. Using the RSA public key crypto system, if p = 13, q = 31 and d = 7, then the value of e is

Q. Which of the following is widely used inside the telephone system for long-haul data traffic?

Q. Find the false statement:

Q. The message 11001001 is to be transmitted  using the CRC  polynomial  x3 +1 to protect it from errors. The message that should  be transmitted is :

Q. What is the bit rate for transmitting uncompressed 800 x 600 pixel colour frames with 8 bits/pixel at 40 frames/second?

Q. In IPV 4, the IP address belongs to

Q. Which layer of OSI reference model is responsible for decomposition of messages and generation of sequence numbers to 'ensure correct re-composition from end to end of the network?'

Q. A client-server system uses a satellite network, With the satellite at a height of 40,000 kms. What is the best-case delay in response to a request (Note that the speed of light in air is 3,00,000 km/second).

Q. The start and stop bits are used in serial communication for