1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
AVprozaik [17]
4 years ago
14

An Internet user has a need to send private data to another user. Which of the following provides the most security when transmi

tting private data?
a. Certifying the data with a Creative Commons license before sending it
b. Sending the data using a high-bandwidth connection
c. Sending the data using public-key encryption
d. Sending the data using a corporate email server
Computers and Technology
2 answers:
Lunna [17]4 years ago
6 0
The correct answer would be A
vazorg [7]4 years ago
4 0

Answer:

C. Sending the data using public-key encryption

Explanation:

Encryption is the only choice that provides security.

You might be interested in
What is a computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or
Harman [31]

Answer:

The correct answer to the following question is Drive-by hacking .

Explanation:

Drive-by hacking is the type of hacking which comes under the cyberterrorism.

Drive-by hacking is the hacking where the hackers can access their data and steal their data, use their network services from some "safe" distance without going inside the company or an organization.

Drive-by download is the type of download of the malicious code into your mobile devices or the computers which occur by designed and it leave you to the cyberattack.

7 0
3 years ago
2 Consider the sequence of keys (5,16,22,45,2,10,18,30,50,12,1). Draw the result of inserting entries with these keys (in the gi
Juliette [100K]

Answer:

A) (2,4) tree

  • Insertion of  key 45 makes key unbalanced and this is because it violates the 2,4 tree so we split the node
  • insertion of key 10 makes key unbalanced and this is because it violates the 2,4 tree so we split the node

B) Red-black tree

Explanation:

The diagrams for the solutions are attached showing the results of inserting entries

6 0
3 years ago
Computer professionals known as software engineers, or Blank______, use the software development life cycle to create software r
Aloiza [94]

Answer:

Computer professionals known as software engineers, or programmers use the software development life cycle to create software required for information systems.

Explanation:

Computer professionals are called software engineers and programmers because they develop and program software. Some additional titles for computer professionals are hardware engineers and iOS/Android developers.

5 0
2 years ago
What was most monumental decision in making a trip to Oregon?
White raven [17]

Answer:

A. The amount of food to take on the journey

Explanation:

Hope you get it right!!

3 0
3 years ago
Read 2 more answers
Outlook 2016 is not only an email client, but it can also be used to schedule meetings and
klio [65]

Answer:

Outlook 2016 is not only an email client, but it can also be used to schedule meetings and <u>Manage appointments</u>.

Explanation:

Microsoft Outlook is a tool that is used to send and receive emails. In outlook 2016 version it has many other advantages such as:

  1. Managing Contact Directory
  2. Managing Address Books
  3. Scheduling Meetings
  4. Managing Appointments
5 0
4 years ago
Read 2 more answers
Other questions:
  • Select all examples of proper keyboarding technique.
    15·2 answers
  • Search engines that search other search engines are called
    12·2 answers
  • How should students approach the decision to take the SAT or the ACT?
    6·1 answer
  • Python provides a special version of a decision structure known as the ________ statement, which makes the logic of the nested d
    13·1 answer
  • Does anyone know why I get notifications on Brainly that say they are from 4 hours ago even though they were just answered
    9·1 answer
  • What layer of the OSI model describes how data between applications is synced and recovered if messages don't arrive intact at t
    12·1 answer
  • Tech A states that modern vehicles use asbestos as the brake material. Tech B states that asbestos is no longer used in brakes.
    8·1 answer
  • . Imagine that you were programming without an IDE. What problems might you encounter?​
    12·1 answer
  • Can i have help for a ggogle class room
    14·1 answer
  • In windows 10, where would you save the template so it is available in the available templates list in backstage view?.
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!