1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Svetach [21]
4 years ago
7

Used prevalently on the web, it allows for secure messages to be sent between parties without having to agree on, or share, a se

cret key. It uses an asymmetric encryption scheme in which the encryption key is made public, but the decryption key is kept private.a. Public Key Encryptionb. Private Key Encryptionc. Block Cipher Encryptiond. Double-blind Encryption
Computers and Technology
2 answers:
Sati [7]4 years ago
7 0

Answer: A- Public Key Encryption

Explanation: The Public key Encryption is used prevalently on the web, it allows for secure messages to be sent between parties without having to agree on, or share, a secret key. It uses an asymmetric encryption scheme in which the encryption key is made public, but the decryption key is kept private.

zloy xaker [14]4 years ago
5 0

Answer:

.a. Public Key Encryption

Explanation:

Based on Encryption; we have two types namely: the Symmetric and the asymmetric encrytion. Symmetric has just one key but Asymmetric has two key (public and private key).

Public key Encryption is the key where the encryption is done using a user's public key and the user can decrypt using his/her private key.

You might be interested in
Which of the following is not a computer application?
Elan Coil [88]
Answer:C.apple Osx
Answer C
7 0
3 years ago
Read 2 more answers
A Molex Connector that connects into a DVD player is easily identifiable by its
Usimov [2.4K]
By its 4 pin socket. ;) Hope this helps!
3 0
3 years ago
Read 2 more answers
True false you cannot fill in a callout​
Svetllana [295]
??????? Can you explain the question some more
8 0
3 years ago
Peter wants to query to determine the names of the students who scored more than 95 in the internal assessment test which functi
Mariulka [41]

the answer is floor

It's too short. Write at least 20 characters to explain it well.

8 0
4 years ago
How do i delete a question ?
seraphim [82]

i think we can't do that

7 0
3 years ago
Other questions:
  • _____ is the standard that enables wireless devices to access web-based information and services. world wide web tcp/ip ethernet
    5·1 answer
  • __________ refers to the idea that eachemployee should report
    14·1 answer
  • Unless you explicitly initialize global variables, they are automatically initialized to
    5·1 answer
  • Although implementations vary, reader–writer locks usually block additional readers if a lock is already held in read mode and a
    13·1 answer
  • How to make classs constructer java.
    14·1 answer
  • How have these advances in-home technology changed the role of technicians in our society?
    10·1 answer
  • Write a Java program that will be able to generate the sample table below.
    5·1 answer
  • How to create create a database in mysql using clv files
    11·1 answer
  • To manage OpenLDAP policies over Command Line Interface (CLI), a certain type of file is needed. What is this type of file calle
    7·1 answer
  • Mark just finished reading the cay and must write a book report comparing events in the book to events in his life. based on eac
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!