1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
JulsSmile [24]
3 years ago
9

1.What is Intellectual Property

Computers and Technology
1 answer:
Akimi4 [234]3 years ago
4 0
I think the answer for 1 is c but I am not sure
You might be interested in
Which of the following statements is not correct ​
just olya [345]
Wich statements ? I don’t see anything
4 0
3 years ago
Read 2 more answers
Bradley is working on a program that uses different classes in specific relationships. Help him remember what these relationship
Kitty [74]

Answer:

First one is INHERITANCE. Second one is AGGREGATION.

3 0
3 years ago
Who is considered as the father of computer science​
Andru [333]

Answer:

Turing is considered as the father of computer science

4 0
3 years ago
Read 2 more answers
Which of the following is not a computer protocol? FTP, SMTP, ISP, or TCP
aliina [53]
ISP stands for internet service provider so that's the one
8 0
3 years ago
Read 2 more answers
As we have seen in this chapter, public-key cryptography can be used for encryption and key exchange. Furthermore, it has some p
Savatey [412]

Answer:

Disadvantages of public key cryptography is that : Assymetric cryptography is slower than the private key cryptography.

Explanation:

We are dealing with big data applications most of time. Almost all applications are data intensive. Private key cryptography which is also known as symmetric cryptography. Symmetric cryptography based systems are faster. Since there is no key transmitted with the data, encrypted data can be transferred over the channel or session even if the path is vulnerable or have chances of interception as the chances of decrypting the data is almost impossible.

Also, The identity of the receiver is guaranteed using the password based authentication used by symmetric crypto systems. Only the trusted receiver who has the access to the secret key can only decrypt the payload

Public Key Cryptography is slower than private key cryptography. Today’s application’s are data intensive. In case of data intensive applications , encrypting huge data will take a lot more time than that of symmetric key cryptography. Whenever Bulk data transmission is needed symmetric key cryptography is preferred. Secret key based crypto systems have proven to be more faster than any currently available assymetric key based crypto systems.

7 0
3 years ago
Other questions:
  • What is the differnces between dark and middle ages of computer?​
    9·1 answer
  • Binary is a sequence of 0s and 1s such as 1001101 which can be used to code information. To break a code, you need to find how m
    14·1 answer
  • The inside color of text or of an object is called the:
    12·1 answer
  • What is a popular use for SLR film cameras? (choose one)
    14·1 answer
  • The natural language convention used to represent ip addresses is called the:
    15·1 answer
  • Julie is purchasing new shoes on a website for her favorite store. Which of the following would indicate that a website is a sec
    6·1 answer
  • State the function of the <br> BIOS,​
    11·1 answer
  • How to give a brainiest on a question? if you teach me i will give brainiest
    7·2 answers
  • Please answer this question correctly​
    9·1 answer
  • 12. In Justify the text is aligned both to the right and to the left margins, adding extra space between words as necessary *
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!