(a)(i) Define the term encryption. (ii) Tick two authentication techniques involved in security measure from Table 1. Table 1 (ii) Outline two features of d...

Question 1 Report

(a)(i) Define the term encryption. (ii) Tick two authentication techniques involved in security measure from Table 1.

Table 1

  (ii) Outline two features of data encryption. (b) While exchanging data with a friend through your mobile phone, you observed that it took a longer time than usual. Outline four factors that may be responsible for the delay in the data transfer.

TECHNIQUE

TICK()

Firewall

 

Biometric

 

Password

 

Intranet