1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Pavel [41]
2 years ago
6

In the digital signature technique when the whole message is signed using an asymmetric key, the sender of the message uses ____

______ to sign the message.
Computers and Technology
1 answer:
rodikova [14]2 years ago
8 0

In the digital signature technique when the whole message is signed using an asymmetric key, the sender of the message uses his or her own private key to sign the message.

You might be interested in
Your company has 1,000 users in a Microsoft Office 365 subscription. A Power BI administrator named Admin1 creates 20 dashboards
AysviL [449]

Answer:

Yes, it is.

Explanation:

Yes it will surely achieve the goal. When there is no license for user, then he/she will not access the dashboard.

7 0
3 years ago
Who invented napier bone and when​
Alinara [238K]

Answer:

<u>Inventor :</u>   John Napier in Year 1617

Explanation:

He was also the inventor of logarithms (which was  invented to aid calculation known as 'Napier's Bones' in 1617.

7 0
3 years ago
Read 2 more answers
How to use function in python
ivann1987 [24]

Answer:

Use the keyword def to declare the function and follow this up with the function name.

Add parameters to the function: they should be within the parentheses of the function. ...

Add statements that the functions should execute.

6 0
3 years ago
Which of the following tasks will save a file over top of itself, using the same filename? A. Reload B. Save C. Save As D. Expor
MrRissso [65]

Answer:

B. Save is the correct option.

4 0
3 years ago
¿Qué tipo de información deben proteger los sitios de comercio electrónico?​
Ksivusya [100]
Come Estás How are you
4 0
3 years ago
Read 2 more answers
Other questions:
  • The =COUNT function calculates what value?
    5·2 answers
  • Ou have an application running on Oracle Cloud Infrastructure. You identified that the read and write operations are slowing you
    10·1 answer
  • Which type of attack broadcasts a network request to multiple computers but changes the address from which the request came to t
    11·1 answer
  • A(n) _________ is a formal access control methodology used to assign a level of confidentiality to an information asset and thus
    6·1 answer
  • What is an effective way to record change management? (5 points)
    9·1 answer
  • You dad has given you his old digital scanner for your new computer. you plug it into the usb drive on your windows 8 computer b
    8·1 answer
  • Consider the following code:
    13·1 answer
  • How do you reset a g.mail password?
    12·2 answers
  • Who wanna be besties
    8·2 answers
  • Help I will mark BRAINLIEST !<br> Explain looping as an invention strategy. Why is it helpful?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!