1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ANTONII [103]
3 years ago
5

To read encrypted data, the recipient must decipher it into a readable form. what is the term for this process? re-securing decr

yption assessment digitization
Computers and Technology
1 answer:
devlian [24]3 years ago
5 0
Decryption. When you use the same key for encryption as decryption, this is called symmetric encryption. When the keys are different, it is called asymmetric encryption.
You might be interested in
Select the correct answer.
S_A_V [24]
I think the answer is b
5 0
3 years ago
Which quality of service (QoS) mechanism provided by the network does real-time transport protocol (RTP) rely on to guarantee a
Radda [10]

Answer:

The real-time transport protocol (RTP) carries the audio and video data for streaming and uses the real-time control Protocol to analyse the quality of service and synchronisation. The RTP uses the user datagram protocol ( UDP) to transmit media data and has a recommended Voice over IP configuration.

Explanation:

RTP is a network protocol used alongside RTCP to transmit video and audio file over IP networks and to synchronise and maintain its quality of service.

8 0
3 years ago
Which part of project management involves determining possible risks?
stira [4]
Resources :) You’re welcome
7 0
3 years ago
Read 2 more answers
Suppose during a TCP connection between A and B, B acting as a TCP receiver, sometimes discards segments received out of sequenc
Shalnov [3]

Answer:

Yes

Explanation:

We known that TCP is the connection \text{oriented} protocol. So the TCP expects for the target host to acknowledge or to check that the \text{communication} session has been established or not.

Also the End stations that is running reliable protocols will be working together in order to verify transmission of data so as to ensure the accuracy and the integrity of the data. Hence it is reliable and so the data can be sent A will still be delivered reliably and it is in-sequence at B.

4 0
3 years ago
What is 1gb in bits?​
Irina-Kira [14]

Answer:

8e+9

Explanation:

3 0
3 years ago
Read 2 more answers
Other questions:
  • You are running an application in Google App Engine that is serving production traffic. You want to deploy a risky but necessary
    9·1 answer
  • Trading your bicycle for a snowboard exemplifies ?
    15·1 answer
  • What will the following program display?
    15·1 answer
  • An information security ________ is a specification of a model to be followed during the design, selection, and initial and ongo
    11·2 answers
  • What would be a reason for using a workstation rather than a personal computer?
    7·1 answer
  • Which Tab contains the font style attributes?<br><br> Home<br> Insert<br> Review<br> View
    8·2 answers
  • Write a while loop that adds the first 100 numbers (from 1 to 100) together. To do so, use a while loop that continues while the
    12·2 answers
  • Create a function names minElement() that takes an array of numbers as a paaramter and returns the min value of the array. The a
    9·1 answer
  • 1. Write a 400-500 word research report about Burke High School.
    6·1 answer
  • Use a spreadsheet to solve this business problem. The owners of an electronics store want to find which of their products makes
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!