1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
hjlf
2 years ago
8

Differentiate between symmetric and asymmetric encryption

Computers and Technology
2 answers:
Shalnov [3]2 years ago
8 0

Answer:

While symmetric encryption uses a single shared key to encrypt and decrypt data, asymmetric uses two separate keys

marshall27 [118]2 years ago
3 0

Explanation:

Symmetrical is exactly similar parts basically it is divided in the middle then u have two equal parts.

Asymmetrical is that u won't have similar parts u will have many parts with different sizes

You might be interested in
Which relation is created with the primary key associated with the relationship or associative entity, plus any non-key attribut
konstantin123 [22]

Answer:

- Transform binary or unary M:N relationship or associative entity with its own key.

Explanation:

Transform binary relation is described as the method through which a decimal can easily be converted into binary while the unary relationship is described as a relationship in which both the two participants occurs from the same entity.

In the given case, 'transform binary or unary M:N relationship' can be created using 'the primary key linked with the relationship plus any non-key aspects of the relationship and the primary keys of the related entities' as it displays the existence of a relationship between the occurrences of a similar set of the entity i.e. associative entity here.

5 0
4 years ago
What is 1 TB equal to ?<br> . 1024 kb<br> .1024 gb <br>. 1024 pb <br>. 1024 mb​
OLEGan [10]

\large \mathfrak{Answer : }

1 TB = 1024 GB

3 0
3 years ago
Read 2 more answers
.Why are protocols important for networking?
NNADVOKAT [17]

Answer: Networking protocols are important as they define a set of rules to be used for exchanging information between computer nodes.

Explanation:

in terms of networking it is required for the source and the destination to have a set of predefined rules which enables the router to send and receive information across the network in such as way that both the ends are able to receive the messages.

The information exchange takes place first by the client by introducing itself to the remote server. the remote server upon receiving the information uses some form of handshaking and acknowledges the client of the receipt of the message.

besides this there are many routing protocols which tells us about the way how packets are sent from the client to the source. There are two types of routing protocols:

1. static routing protocols

2. dynamic routing protocols.

6 0
3 years ago
Which kind of results were pier using the search Query " frosty the snowman"
Pavel [41]
A hat i think not sure.
7 0
4 years ago
Read 2 more answers
Which of the following bit patterns represents the value -9 in two’s complement notation?
nadya68 [22]

Answer:

B. 11110111

Explanation:

Binary representation of number 9 = 00001001

Binary representation of -9 would involve calculating the twos complement representation of 00001001

First we compute the ones complement of this number by reversing the bits.

00001001 => 11110110

Next we calculate the twos complement representation by adding 1 to the ones complement.

11110110+1 = 11110111

So the final representation is 11110111.

5 0
3 years ago
Other questions:
  • What does Mishler mean by the foreground-background interaction? How can this affect the photographs, based on the examples in t
    14·2 answers
  • Write a program that receives a series of numbers from the user and allows the user to press the enter key to indicate that he o
    11·1 answer
  • What binary number is the output of adding 1001011 and 100000?
    13·1 answer
  • Look at the graph. What is the meaning of the point shown with a star
    6·1 answer
  • Wide area network (WAN) connects multiple networks that are in the same geographical locations.
    6·1 answer
  • HELP ME PLEASE ASAP!!!
    13·2 answers
  • What is a career pathway for ctso
    6·2 answers
  • Lan is working on a project report that will go through multiple rounds of
    10·1 answer
  • What are a few ways to format the text in a mail message in Outlook? Check all that apply.
    7·2 answers
  • Jennifer has written a short story for children. What should be her last step before she submits the story for publication?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!