Q. …………………. Is the process of coding and scrambling of messages toprevent un authorized access to under standing of data being transmitted (Solved)
1. cryptography
2. encryption
3. security key
4. none
- b. encryption
1. cryptography
2. encryption
3. security key
4. none