answersLogoWhite

0


Best Answer

xtau la kawe weii <<< gilo nate nih... baso bengong...

User Avatar

Wiki User

9y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: Your ms-access table data is encrypted how to decrypt?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

What is a characteristic of public key cryptography?

If data is encrypted with the public key, only the private key can decrypt itAnswer Explanation: Public key encryption uses an asymmetric algorithm, which uses a public key and private key combination for the encryption and decryption process. If data is encrypted with the public key, only the private key can decrypt the data. The public key cannot decrypt a message that was encrypted with the public key. Alternatively, if data is encrypted with the private key, only the public key can decrypt the data.


Why does encrypted data often look like gibberish to unauthorized users?

The purpose of encryption is to make a message/data unreadable to someone who does not have the key to decrypt it, so it is highly likely that encrypted data will appear to be gibberish.


What are characteristics of public key cryptography?

If data is encrypted with public key, only private key can decrypt it. AGN


Trying numerous possible character combinations to find the key that will decrypt encrypted data is known as a what?

brute force attack


What attack occurs when a hacker tries numerous possible character combinations to find the key that will decrypt encrypted data?

a brute force attack


A user has encrypted important data files and now is no longer working for your company How do you decrypt these files so they can be read?

From the file's Properties dialog box ,click the Advanced button. In the Advanced Attributes dialog box, uncheck Encrypt contents to secure data


Suppose a user has encrypted important data files and now is no longer working for your company How do you decrypt these files so they can be read?

Only the administrator can decrypt these files. He does it by going to the file's Properties dialog box, click the Advanced button. In the Advanced Attributes dialog box, uncheck Encrypt contents to secure data.


What is cryptography and how is it related to computers?

Cryptography is a means of encrypting or obscuring information. It is related to computers mainly by the internet. When data is passed between a client and a server it can be encrypted so that only the desired recipient can decrypt the data and read it, preventing eaves dropping or interception of the data because the eaves dropper will not be able to decrypt the data (not easily anyway). It can also be used when storing data on a computer - thereby preventing anyone decrypting the data and viewing it.


How can you see encrypted data in Microsoft Access database table?

1. Check MS Access' help under search and put in "encrypted". It may tell you how to convert the data into a readable format. 2. Dependent upon the product, it may not be possible. For instance, in my database, it is impossible for me to see someone's password. I, as the DBA, can change the password, but I cannot view it in a database table. Hence, the purpose for encrypted data.


What is the disadvantage of using CBC for random access compared with CTR mode?

You need at least Cn-1 and Cn to decrypt pn when data is encrypted using CBC mode, for ctr mode, just Cn is required in order to decrypt Pn provided the offset is known. --Swair Mehta


Is there a way algorithm to encrypt more numbers in one number and can decrypt?

Yes, there are several algorithms for data compression, that is, store data in less space than it usually needs. However, not all data can be encrypted. Encryption basically takes advantage of some sort of repetition in data; once all repetition has been eliminated, data can be encrypted no more.Yes, there are several algorithms for data compression, that is, store data in less space than it usually needs. However, not all data can be encrypted. Encryption basically takes advantage of some sort of repetition in data; once all repetition has been eliminated, data can be encrypted no more.Yes, there are several algorithms for data compression, that is, store data in less space than it usually needs. However, not all data can be encrypted. Encryption basically takes advantage of some sort of repetition in data; once all repetition has been eliminated, data can be encrypted no more.Yes, there are several algorithms for data compression, that is, store data in less space than it usually needs. However, not all data can be encrypted. Encryption basically takes advantage of some sort of repetition in data; once all repetition has been eliminated, data can be encrypted no more.


How data encrypt and decrypt from PC to PC using micro controller?

How data encrypt and decrypt from PC to PC using micro controller?