1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Fudgin [204]
3 years ago
8

A ______ is Data appended to, or a cryptographic transformation of, a data unit that allows a recipient of the data unit to prov

e the source and integrity of the data unit and protect against forgery.
Computers and Technology
1 answer:
RUDIKE [14]3 years ago
7 0

Answer:

The correct answer to the following question will be "Digital Signature".

Explanation:

Digital Signature or Authentication is a mechanism that assures that the meaning of a message has not altered during transit. Whenever you, the sender, digitally sign an agreement, use your formal and informal key pair to encrypt the content of the message.

It helps the data unit receiver to prove the origins and credibility of the data unit and to defend it against falsification.

You can use this Signature Certificates as follows:

  • For transmitting digitally agreed to sign and encrypted addresses.
  • To execute secure internet-based transactions or to recognize other partners in internet-based transactions.

Therefore, Digital Signature is the right answer.

You might be interested in
Which of the following enables robots to do things such as understand itself, walk, talk, and develop skills?
zmey [24]

Answer:

self-modeling

Explanation:

Robots, which are man-made machines which mimics the actions of man like walking, talking, rendering assistance are part of the future plans to make the society easier. It was mans' attempt to improve the society but still happens to be work in progress.

For the robots to be able to carryout its function, there is need for it to be self modelling in the sense of initiating and executing the commands which was already programmed into it. <em>For example, telling it to walk will be initiated by him as a command, after processing the command, it will execute it without any other information.</em>

7 0
3 years ago
Elevenplus = input ("Are you age 11 or over? (Y/N):") if elevenplus == "Y": print("you can ride the roller coaster") else: print
anastassius [24]

Answer:

The variable used is elevenplus

Explanation:

Given

The above code segment

Required

The variable in the code

In Python, variables are used to take inputs, and they are used to storing values.

On the first line of the program, elevenplus is used to get input for age.

Up till the end of the program, no other variable is introduced.

<em>Hence, the variable in the program is </em><em>elevenplus</em>

4 0
3 years ago
True or False? To use a C++ library function, you must use an #include directive to include the appropriate header file.
lakkis [162]

Answer:

True

Explanation:

While programming in most programming languages, one will have need to use functions and variables defined in other class libraries. in C++, these functions and variables' definitions are contained in Header files, which can be imported and used into any C++ program by using the pre-processor #include statement. This statement is the equivalent of import in java and copy in other languages. Popular header files are the Maths class (Allows use of maths functions like power, square roots exponentiation etc), the input/output (allows usage of cout print statement and cin input statement)

7 0
3 years ago
You are responsible for tech support at your company. You have been instructed to make certain that all desktops support file an
lesya692 [45]

Answer:

The file system that we shall choose is NTFS file system.

Explanation:

NTFS file system is a file system developed by Microsoft that provides file system encryption. Encryption means to secure our data in such a way such that only authorized person's can have access to it. NTFS file system allows to encrypt data so that all our data is safe from various cyber related thefts thus making our system and data safe from vulnerability of theft.

Encryption does not prevent access to data but the data that is accessed by various agents remains meaningless to all the agents until the user of the data decrypts it.

3 0
4 years ago
Using the diagram to the right, match each letter
alexira [117]

Answer:

A - slide

B - ribbon

C- command

D - group

E - format painter

F - tab

Explanation:

edge2020

5 0
3 years ago
Other questions:
  • Which of the following would be a tradeoff of a scientific advancement that enables us to catch fish from the ocean faster than
    5·1 answer
  • A/an ___________ is a scheduling tool that sets the standard and nonworking time for the project and is used to assess how tasks
    6·1 answer
  • You also learn in class that one kilobyte of computer memory will hold about 2/3 of a page of typical text (without formatting).
    6·1 answer
  • What is a primary feature of a digital video camera?
    9·1 answer
  • If you’re the victim of cyber bullying behavior, besides contacting your teacher or the school, where else can you go to find in
    13·1 answer
  • What is the data and information with example? ​
    9·1 answer
  • What is a navigation bar?
    7·1 answer
  • What would the following program print to the screen when run?
    7·1 answer
  • What are some other ways to program a robot to navigate a complicated environment other than straight paths and right angle (90
    8·2 answers
  • What is phishing?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!