1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
AlladinOne [14]
2 years ago
15

If David wishes to digitally sign the message that he is sending Mike, what key would he use to create the digital signature

Computers and Technology
1 answer:
Goshia [24]2 years ago
7 0

The key would he use to create the digital signature is Mike public key.

<h3>Which key is used to sign messages?</h3>

Digital signatures are known to be used via public key. Here, the person is said to be one who is said to produce or creates the digital signature that  uses a private key to encrypt signature-linked data.

The only way to decrypt a data is only with the signer's public key, the key David would use to create the digital signature is Mike public key.

Learn more about  public key from

brainly.com/question/17486027

You might be interested in
When determining the amount of RAM necessary for a computer you wish to purchase, what should you consider?
Igoryamba

Answer:

"The type of the software which a user wants to use" is a consideration point for the amount of ram while purchasing the computer system.

Explanation:

  • The Ram is primary memory, which is used when the system is in on mode. When there is less amount of Ram, then the user of the computers can not able to run multiple programs or runs that type of program which consumes more memory.
  • And if there is a high amount of RAM memory, then the user can run multiple programs at the same time or can run that program which takes more memory.
  • So when any user wants to decide about the Ram, then he can by deciding the type of software, which he wants to use. How much that software can use the memory.
8 0
3 years ago
You are the system administrator for a medium-sized Active Directory domain. Currently, the environment supports many different
Bogdan [553]

Answer:

All the Above

Explanation:

Domain local groups, global Groups, Universal Security Groups all these 3 groups can be used.

7 0
3 years ago
A(n application system is the master controller for all the activities that take place within a computer system. _______________
Elenna [48]
The answer is b.false
3 0
3 years ago
Aaron is stating the main idea of what he read in his own words. He is _____.
Feliz [49]

Answer:

summarizing

Explanation:

when someone explains in their own words the main idea of a story, it is summarizing.

8 0
3 years ago
Read 2 more answers
Example of Bandwidth Analogies: using Pipe
skelet666 [1.2K]

Answer:

Bandwidth describes the maximum data transfer rate of a network or Internet connection. ... For example, a gigabit Ethernet connection has a bandwidth of 1,000 Mbps (125 megabytes per second). An Internet connection via cable modem may provide 25 Mbps of bandwidth.

7 0
3 years ago
Read 2 more answers
Other questions:
  • Xml is used to format the structure and style of a web page. true or false
    7·1 answer
  • Your network administrator finds a virus in the network software. Fortunately,
    13·1 answer
  • ​ If a class is reusable, that is to say that it can be used in several different applications, then it has been designed using
    5·1 answer
  • Which access control principle specifies that no unnecessary access to data exists by regulating members so they can perform onl
    11·1 answer
  • C:\windows\system32\drivers\etc\protocol is an example of a file ________. select one:
    5·1 answer
  • What is the output of adding 1001011 and 100000?
    7·1 answer
  • Each sentence in the paragraph below has a number. Choose the number of two sentences that are in the wrong order in this story.
    14·1 answer
  • What best describes the ability to increase the access to server resources and provide fail-safe services by linking two or more
    13·1 answer
  • true or false You are able to change the formatting of a table after it is inserted into a placeholder.
    6·1 answer
  • WHAT ACTIONS CAUSE SPAM ON LINKEDIN?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!