1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
balandron [24]
3 years ago
10

If you and another person want to encrypt messages, what should you provide that person with?

Computers and Technology
1 answer:
qaws [65]3 years ago
3 0

The encrypt key or encrypt passphrase

You might be interested in
Which compound is obtained by the oxidation of primary alcohol with nascent oxygen​
Nookie1986 [14]

answer:

what

Explanation:

8 0
3 years ago
The database contents might be loaded interactively or in batch mode using a variety of methods and devices including customized
oksian1 [2.3K]

Answer:

The answer is "Option A".

Explanation:

Database information is a storage file, that contains material for the SharePoint web application for one or more sets of sites. This content may include websites, files, documents, photographs and more. In this storage file a data store in batch mode, which uses a variety of different methods and tools, like custom software programs, that's why the given statement is "True".

4 0
3 years ago
A Venn diagram is used to show can somebody help plz
djyliett [7]
A venn diagram is used to show the similarities and the differences  <span />
3 0
4 years ago
Read 2 more answers
Write a program that asks the user to enter a whole number then outputs a 0 if the number is even or a 1 if the number is odd. (
12345 [234]

Answer:

What language?

Explanation:

7 0
4 years ago
The coding system that has just two characters is called:
cupoosta [38]

Answer:

A. Binary

Definition:

Pertaining to a number system that has just two unique digits 0 and 1. - binary code

6 0
3 years ago
Read 2 more answers
Other questions:
  • A(n) ________ software installation enables you to decide which features you want to install on the hard drive
    10·1 answer
  • 1. The best program to present numerical data in would be ____. a. Access c. PowerPoint b. Excel d. Word
    6·1 answer
  • A PenTester has successfully exploited a remote host on a clients’ network. They want to create a backdoor on the host for futur
    11·1 answer
  • Using symbols in a file name is a good idea.<br><br> True<br> False
    9·2 answers
  • You have been hired as a Systems Analyst in a famous Burger chain. Due to its popularity, the demands from customers also increa
    7·1 answer
  • Suppose that the performance measure is concerned with just the first T time steps of the environment and ignores everything the
    14·1 answer
  • To use appropriate personal protective equipment we should​
    12·1 answer
  • Why are peripherals added to computers?
    12·1 answer
  • Read the sentence. Piles of discarded trash litter the cobblestones of the quaint brick alley. Which image best shows a visualiz
    5·1 answer
  • Suppose we compute a depth-first search tree rooted at u and obtain a tree t that includes all nodes of g.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!