1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ronch [10]
3 years ago
9

Asymmetric encryption uses (choose all that apply):

Computers and Technology
1 answer:
yan [13]3 years ago
7 0
Asymmetric uses two different keys (Public keys and private keys) for both encryption and decryption of data.  It is s any cryptographic<span> system that uses pairs of keys: public keys which may be distributed widely, and private keys which are known only to the owner.</span>
You might be interested in
Check all of the file types that a Slides presentation can be downloaded as.
GuDViN [60]

Answer:

.JPEG

.PDF

.pptx

General Concepts:

<u>Google</u>

  • Slides has an option to download a wide multitude of formats

Explanation:

If we go into File, and then under Download, we should be able to see which file types that a Slides presentation can be downloaded as.

Attached below is an image of the options.

4 0
3 years ago
Read 2 more answers
Encryption relies on the use of _________to ensure that information is readable only by the intended recipient.
stich3 [128]

Answer:

Encryption Keys

Explanation:

In order to make sure only the intended recipient receives the information, encryption keys rely on a unique pattern, just like your house key, except instead of grooves and ridges encryption keys use numbers and letters.

4 0
3 years ago
What two names are given to the blinking vertical line?
Paha777 [63]

Answer:

<u>see </u><u>below</u><u>:</u>

Explanation:

One is (the cursor).

Whenever you see a flashing vertical line called-the cursor--you can start typing.Note that the mouse pointer is also called a cursor,but it is shaped differently.The keyboard cursor is also called the insertion point.

5 0
3 years ago
With the help of technology students will benefit greatly from studying by themselves at home. Do you agree or disagree with the
cestrela7 [59]
I disagree because when kids are home alone, and you think they are studying they might not be and they will be playing games on the computer.
6 0
3 years ago
Read 2 more answers
What are the five functions of bones
hodyreva [135]
Soporte ,Protección, Movimiento, Homeostasis mineral ,<span>Producción de células sanguíneas</span><span />
7 0
3 years ago
Other questions:
  • Why does the PC send out a broadcast ARP prior to sending the first ping request
    12·1 answer
  • What are scape codes and the effectes on out put
    6·1 answer
  • If you are driving at night, you should not use high-beam headlights within _________ of oncoming vehicles. Florida Road Rules 4
    9·2 answers
  • A difference between crt monitors and flat-panel displays is that most flat-panel displays use digital signals to display images
    8·1 answer
  • A technician wants to limit access to a group of folders and is using Group Policy to prevent the users in the sales department
    9·1 answer
  • Credence is a student in college.
    13·2 answers
  • Using the Insert tab, you can convert text into a table and a table into text.
    15·1 answer
  • Activity #2
    13·1 answer
  • What is the difference between information poor and information rich<br>​
    13·1 answer
  • Select the correct technical term for each definition by using the drop-down menus.
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!