1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
hjlf
2 years ago
8

Differentiate between symmetric and asymmetric encryption

Computers and Technology
2 answers:
Shalnov [3]2 years ago
8 0

Answer:

While symmetric encryption uses a single shared key to encrypt and decrypt data, asymmetric uses two separate keys

marshall27 [118]2 years ago
3 0

Explanation:

Symmetrical is exactly similar parts basically it is divided in the middle then u have two equal parts.

Asymmetrical is that u won't have similar parts u will have many parts with different sizes

You might be interested in
What is the Slide Sorter View used for?
bonufazy [111]

Answer:

b. bc u can delete and add slides in ur presentation

3 0
3 years ago
Read 2 more answers
FIRST AMSWER GET BRAINLIEST​
MA_775_DIABLO [31]

Answer:

agile --> business modeling

RAD --> pair programing

waterfall --> deployment

spiral --> risk analysis

v-shaped model --> integration testing

not too sure about this but i tried

4 0
3 years ago
What are the features of the Outline view in Word? Select three options.
Lynna [10]

Answer:

A,B,C

Explanation:

Outlines can be used in different ways:

1) to create the structure of a new document by manipulating Headings

2) Help to navigate across large document

3) Display the text or an abstract of the content with Headers

5 0
3 years ago
Write a c program to count the total number of commented characters and words in a c file taking both types of c file comments (
Tanzania [10]

#include<stdio.h>

#include<stdlib.h>

int comment1(FILE *fp)

{

   char ch;

   int count=0;

   while(fscanf(fp,"%c",&ch)!=EOF)

   {

       if(ch=='\n')

       {

           return count;

       }

       count++;

   }

   return count;

}

int comment2(FILE *fp)

{

   char ch;

   int count=0;

   while(fscanf(fp,"%c",&ch)!=EOF)

   {

       if(ch=='*')

       {

           fscanf(fp,"%c",&ch);

           if(ch=='/')

           {

               return count;

           }

           count++;

       }

       count++;

   }

   return 0;

}

int main()

{

   printf("Enter the file name:");

   char s[1000],ch,ch1;

   scanf("%s",s);

   FILE*fp;

   fp = fopen(s,"r");

   int count=0;

   while(fscanf(fp,"%c",&ch)!=EOF)

   {

       if(ch=='\"')

       {

           while(fscanf(fp,"%c",&ch)!=EOF)

           {

               if(ch=='\"')

               {

                   break;

               }

               if(ch=='\\')

               {

                   fscanf(fp,"%c",&ch);

               }

           }

       }

       else if(ch=='/')

       {

           fscanf(fp,"%c",&ch);

           if(ch=='/')

           {

               count += comment1(fp);

           }

           else if(ch=='*')

           {

               count += comment2(fp);

           }

       }

   }

   printf("%d\n",count);

   return 0;    

}

3 0
3 years ago
Read 2 more answers
What if i accidentally delete an assignment in canvas.
elena55 [62]

Answer:

it shouldnt matter. If it was one that was already graded then you should be good. But if it hasnt had a grade and it doesnt ever come back, then check in with your teacher to make sure your still getting the grade.

Explanation:

Hope this helps :)

8 0
2 years ago
Other questions:
  • A video conferencing application isn't working due to a Domain Name System (DNS) port error. Which record requires modification
    15·1 answer
  • Jacob is a website designer. Whenever his company takes on a new project, Jacob takes the initiative and comes up with ideas and
    12·1 answer
  • At the Network layer, what type of address is used to identify the receiving host?
    10·1 answer
  • Which type of natural hazard is sometimes caused by human activity?
    6·1 answer
  • Can a computer will work more efficiently if you perform disk optimization
    9·1 answer
  • What is an electronic path over which data can travel.
    7·1 answer
  • Imagine you are building an ATM system; list at least 6 application domains for the system. That is, in which context is the sys
    13·1 answer
  • Which concept often comes in conflict with privacy rights?
    14·1 answer
  • What will be the value of “sumtotal” when this code is executed?
    6·1 answer
  • One microsleep warning sign occurs when you catch yourself leaning blank in the drivers seat
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!