1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
AlladinOne [14]
2 years ago
15

If David wishes to digitally sign the message that he is sending Mike, what key would he use to create the digital signature

Computers and Technology
1 answer:
Goshia [24]2 years ago
7 0

The key would he use to create the digital signature is Mike public key.

<h3>Which key is used to sign messages?</h3>

Digital signatures are known to be used via public key. Here, the person is said to be one who is said to produce or creates the digital signature that  uses a private key to encrypt signature-linked data.

The only way to decrypt a data is only with the signer's public key, the key David would use to create the digital signature is Mike public key.

Learn more about  public key from

brainly.com/question/17486027

You might be interested in
DOES ANYONE KNOW HOW TO CHAGE THE IP ON A COMPUTER?
MaRussiya [10]
Try downloading a VPN

8 0
4 years ago
In procedural programming, where does the flow of control usually route from the main function?
Zinaida [17]

Answer:

Subroutine or called function.

Explanation:

Procedural programming is a programming techniques of creating modular divisions between lines of code, with a provision to call and run a block of code at any given instance in the program.

A program flow control breaks at will from the main function to a target defined function or subroutine, which returns a value back to the normal flow of the program. It uses conditional and loop statement to achieve its task.

6 0
3 years ago
A Web _a___ is a software program that retrieves the page and displays it. Select one:
Ivahew [28]
The answer is station
4 0
4 years ago
Drag each label to the correct location on the image.
Anna [14]

Answer: uses a heat activated.... the answer is dry mount

Use triangular pockets to hold the corners....the answer is photo corners

Use different patterns of tape.....hinge mount

Uses wet glue to stick the print....wet mount

Explanation: I got this right on a post test

5 0
3 years ago
A stateful inspection firewall ________. select one:
mart [117]

;) https://quizlet.com/7016715/cyber-security-flash-cards/ go check the link

6 0
3 years ago
Other questions:
  • Use this illustration to answer the question.
    15·1 answer
  • A _______ is used to analyze and summarize your data without graphical support. A. PivotChart B. PivotTable C. chart D. table
    8·1 answer
  • Digital subscriber lines: a. are very-high-speed data lines typically leased from long-distance telephone companies. b. operate
    5·1 answer
  • .doc What is the difference between a skilled hacker and an unskilled hacker, other than skill levels? How does the protection a
    5·1 answer
  • A technician has been told that a keyboard is not responding at all. What can the technician do quickly to determine whether tha
    9·1 answer
  • While reviewing the Quick Access toolbar, Sarah notices that the Redo button is not there. This is because the Redo button only
    12·1 answer
  • You have a manager who makes decisions without getting input from anyone. They are unwilling to change anything once a decision
    14·1 answer
  • Anne creates a web page and loads a CSS style script along with the page. However, the entire page appears black and she cannot
    6·1 answer
  • Pretend This artwork is titled online hate speech. Now what do you see?
    5·2 answers
  • Order the steps to add a recommended chart in excel.
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!