1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
balandron [24]
2 years ago
10

If you and another person want to encrypt messages, what should you provide that person with?

Computers and Technology
1 answer:
qaws [65]2 years ago
3 0

The encrypt key or encrypt passphrase

You might be interested in
What frequency band is used by bluetooth, 802.11b, and 802.11g?
bagirrra123 [75]
802.11 is a Wi-Fi standard, not a frequency, both of those operate at 2.4 GHz. Bluetooth operates at frequencies between 2402 and 2480 MHz, or 2400 and 2483.5 MHz. 
4 0
2 years ago
What is the top anime shows? <3
LenKa [72]

Answer:

This is personally based on my opinion.

My top 10 favorites

Toradora

Darling in the franxx

Lucky Star

My Melody

Death note

Attack on titans

One piece

The Promise neverland

Kaguya-sama: love is war

Black cover

4 0
2 years ago
Read 2 more answers
In which order does the processor search computer memory when it requires instruction or data?
skelet666 [1.2K]

Answer:

I think the answer is

Ram- Cache Memory-Hard disk

Explanation:

I hope this helps you

4 0
2 years ago
The area or the window that shows the current folder location​
Alex Ar [27]

Answer:

The focused window

Explanation:

However, please provide some more details about this because the question itself is very vague.

8 0
3 years ago
HELP PLEASE!!!Salman wrote a SMART goal for class. Part of the goal includes the fact that he will complete Ms. Murray's extra-
kirill115 [55]

Answer:

the answer is specific

Explanation:

5 0
3 years ago
Read 2 more answers
Other questions:
  • While in an interactive nslookup session, you'd use the ______ keyword to change the DNS server you're using
    5·2 answers
  • Systematically tackling the threats and vulnerabilities in the seven individual domains of a typical IT infrastructure helps you
    6·1 answer
  • What keyboard functions lets you delete words
    9·2 answers
  • Why do many experts recommand longer time horizonal if you are doing high risk investment
    7·1 answer
  • I need help!!!! 1.04
    9·1 answer
  • What are stored procedures? What kind of attack do stored procedures protect from? Identify two reasons why stored procedures ar
    14·1 answer
  • Xbox one is not turning on and power brick is orange why is that?​
    6·1 answer
  • 12. In Justify the text is aligned both to the right and to the left margins, adding extra space between words as necessary *
    13·2 answers
  • Numerous engineering and scientific applications require finding solutions to a set of equations. Ex: 8x + 7y = 38 and 3x - 5y =
    15·1 answer
  • Which of the examples is part client side code
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!