• A Encryption
  • B Optimization
  • C Modification
  • D Compression