1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mamaluj [8]
3 years ago
15

What is diffie-hellman most commonly used for?

Computers and Technology
1 answer:
Alex777 [14]3 years ago
6 0
DH is an algorithm to derive a shared secret over an unsafe channel.

Both parties exchange public keys, and can join them together with their private keys to create the secret. An eavesdropper can see both public keys, but since he doesn't posess the private keys, cannot derive the same secret.

The secret can be used to subsequently encrypt communications with a symmetric algorithm.

TLS uses this approach.
You might be interested in
Currently, the users in your company are required to use their IP addresses when connecting to other hosts. Since IP addresses a
Sonja [21]

Answer:

False

Explanation:

Using subnet mask will be helpful, what the subnet mask does is moving the IP address boundary bettween the part that represents a network and the part that represents a host, thus, instructing the operating system which IP addresses are on the local subnet. Then the operating will communicate directly with the other host without using the router. Once this is achieved, memorizing the IP addresses is needless.          

8 0
3 years ago
Drag the tiles to the correct boxes to complete the pairs.
jek_recluse [69]

Answer:

1. Multistage database.

2. Stationary database.

3. Virtual database.

4. Distributed database.

Explanation:

A database management system (DBMS) can be defined as a collection of software applications that typically enables computer users to create, store, modify, retrieve and manage data or informations in a database. Generally, it allows computer users to efficiently retrieve and manage their data with an appropriate level of security.

There are four (4) major types of database in a data warehouse and these are;

1. <u>Multistage database</u>: used for concise as well as detailed historical data. It provides summarized data which can be used by an employee for short-term decision making.

2. <u>Stationary database</u>: used where access to data is rare i.e business firms who do not access data frequently. In order to use this database, the users must have an access to metadata store and thus, directly having access to the data on a source system.

3. <u>Virtual database</u>: used for accessing data in diverse applications using middleware. This type of database is dependent on having access to information on various databases.

4. <u>Distributed database</u>: used by an organization that runs several businesses. Therefore, this type of database are usually located or situated in various geographical regions.

5 0
3 years ago
Which of the following statements is false? A constructor is similar to a method but is called implicitly by the new operator to
Volgvan

COMPLETE QUESTION:

Which of the following statements is false?

A) A constructor is similar to a method but is called implicitly by the new operator to initialize an object's instance variables at the time the object is created.

B0 Scanner method next reads characters until any white-space character is encountered, then returns the characters as a String.

C)A class instance creation expression begins with keyword new and creates a new object.

D) To call a method of an object, follow the object name with a comma, the method name and a set of parentheses containing the method's arguments.

Answer:

D) To call a method of an object, follow the object name with a comma, the method name and a set of parentheses containing the method's arguments.

Explanation:

To call a method, the name of the object is not followed by a comma (,) but with a dot (.) operator, the method's name and a set of parentheses containing the method's arguments, then follows.

4 0
3 years ago
Claudia is allowed to work from home 3 days per week. She takes home sensitive personnel files on a flash drive for use while at
LenKa [72]

Answer:

Installed software

Explanation:

Since we are told that she is often allowed to work from home 3 days in a week in which She takes home with her sensitive files that is contained in her flash drive for use while at home which means that in a situation where her company does not allow remote access to the company servers in which she is only free to either make use of a cloud-based version of the application or have it installed on her home machine the type of application category i would recommend her to use at home is for her to INSTALLED SOFTWARE on her home machine reason been she mostly work from home and secondly if software is installed on her machine it would make it more easier for her carry out her tasks from home.

6 0
3 years ago
Microsoft Office PowerPoint 2016 enables you to create robust multimedia _______.
Jet001 [13]

Microsoft Office PowerPoint 2016 enables you to create robust multimedia presentations.

What is Multimedia presentations?

A multimedia presentation is a type of presentation that uses various forms of digital communication to convey the message, such as video, interactive slides, audio clips, music, and more.

Multimedia presentations, in short, go beyond the use of text and images. Including digital media such as animation, video, audio, or interactive features such as forms, popups, and more can help to enrich your presentations visually.

A presentation consists of a series of slides. Each slide contains text, graphics, audio, and video content. The content can then be manipulated by adding transitions, animations, and graphic effects. Before you begin creating a presentation, you should become acquainted with some of PowerPoint's basic features.

To learn more about Presentations in PowerPoint, visit: brainly.com/question/23714390

#SPJ4

5 0
1 year ago
Other questions:
  • What is one way to process your thoughts about the information you are reading?
    14·2 answers
  • What type of camera is a cell phone camera
    14·2 answers
  • How does electricity work in phones?
    14·1 answer
  • The development team recently moved a new application into production for the accounting department. After this occurred, the Ch
    7·1 answer
  • How do you recognize the brand name of a drug in the package insert?
    15·1 answer
  • Select the correct word to complete the sentence
    11·2 answers
  • Does anyone know what i did wrong?
    13·1 answer
  • If the disaster requires actions offsite from the primary infrastructure, it is under the jurisdiction of__________.
    7·1 answer
  • write an assembly program that uses the output compare function of a timer to toggle an led every second
    6·1 answer
  • Which is an action that an operating system performs? (1 point)
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!