I’m stuck on a Computer Science question and need an explanation.


As you all read, according to Kirk (2016), most of your time will be spent working with your data. The four following group actions were mentioned by Kirk (2016):

  • Data acquisition: Gathering the raw material
  • Data examination: Identifying physical properties and meaning
  • Data transformation: Enhancing your data through modification and consolidation
  • Data exploration: Using exploratory analysis and research techniques to learn

Select 1 data action and elaborate on the actions preformed in that action group.


Write 200 to 300 words defining encryption and how it used in application security.