1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
BaLLatris [955]
3 years ago
10

A number used to encrypt data is called a(n ________. signature key cookie escrow

Computers and Technology
1 answer:
Stels [109]3 years ago
3 0
The answer would be a key. Everything that is encrypted (unless it is 1 way encryption which is never used) requires a key. Without it, how would computers or people read the encrypted data? Good luck!
You might be interested in
20<br>Calculate the kinette energy of a body the speed<br>that will be a mass tragm​
jolli1 [7]

Answer:

20

Explanation:

4 0
3 years ago
What is a feature of Print Preview?
Snezhnost [94]
Fit to page i believe
6 0
3 years ago
Mobile devices need to work within limited screen space ? true or false
wariber [46]
False. Trust me my friend
4 0
4 years ago
Read 2 more answers
Default color html ​
Marrrta [24]

Answer:

black for font...

and

white for bg color

Explanation:

i think this is enough for ur question...

3 0
3 years ago
Daphne used to work in the city where she would take public transportation to work. However, she just took a new job in the subu
mr Goodwill [35]

Answer:

A need

Explanation:

Daphne has no choice but to get a car and a house immediately, she relocates. Anything that is a choice and gives you the desire to acquire it, but cannot, due to one reason or the other, is a want. A need, on the hand, is something that Daphne should have to survive. She will need a car and a house to stay alive and will obviously not do anything without them. A home and a car are physical needs that can be touched or measured while aspects like happiness and good health are subjective needs that we need as humans to survive.

4 0
3 years ago
Other questions:
  • What is the most common threat on the internet? auction fraud illegal software computer viruses hackers?
    14·1 answer
  • Consider a tcp connection between host b and server
    9·1 answer
  • Which set of steps will organize the data to only show foods with more than 100 calories and rank their sugar content from great
    8·1 answer
  • An algorithm is defined as a well-ordered collection of unambiguous and effectively computable operations that when executed pro
    10·1 answer
  • Organizations are struggling to reduce and right-size their information foot-print, using data governance techniques like data c
    7·1 answer
  • Kelvin owns a small trading firm. Recently, he suspected that some of his employees were using fraudulent activities for their p
    5·2 answers
  • (10 points) A stopwatch has three states named Zero, Running, and Stopped. There are two buttons, named B1 and B2. For each butt
    13·1 answer
  • Match the command to the use. Test connectivity to a remote computer Test DNS lookup View packets in a transmission Display the
    14·1 answer
  • MAN speeds are faster than WAN speeds because of ________. technological limitations regulatory limitations
    6·1 answer
  • What is the best memory to be used? Why?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!