1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
frez [133]
3 years ago
15

A coffee shop is considering accepting orders and payments through their phone app and have decided to use public key encryption

to encrypt their customers' credit card information. Is this a secure form of payment?
Yes, public key encryption is built upon computationally hard problems that even powerful computers cannot easily solve.
No, encryption is an issue in that case
Computers and Technology
1 answer:
Charra [1.4K]3 years ago
8 0

Answer: Yes

Explanation:

Public key encryption is the encryption technique that is used for private keys and public keys for securing the system.Public key is used for encryption and private key is for decryption.Public keys can only open content of the system

  • According to the question, public key encryption is secure for coffee shop customer payment process as they are stored on digital certificates in long form for verifying digital signature and encrypting information.Its computation is difficult to crack through power computer access.  
  • Other options is incorrect as encryption is not a problem for payment procedures. Thus, the correct option is yes ,public key encryption is secure method for coffee shop customers .
You might be interested in
What is the importance of human flourishing to science and technology?​
nadya68 [22]

Explanation:

:*):*):*)*)*:)*:)*:*)*:**:*)*:)*:)*:*):*)*P:)*:*):*)

:*

):*

)*:

)*:*

):*):*)*:*):*)*:*):*):*):)*:*):*):*):*)

:*):*)

6 0
3 years ago
Relatively simple CRUD (create, read, update, delete) web applications development can be facilitated with: _________.
Talja [164]

Answer:

c. Web Application Frameworks

Explanation:

Web Application Frameworks is a form of a software framework that is made to perform support for the building of web applications such as web services, web resources, and web APIs. Web frameworks.

Also, Web Application Frameworks automatically perform the function of primary activities carried out in web development such as create, read, update, delete.

Hence, in this case, the correct answer is Web Application Framework.

5 0
3 years ago
Use computer magazines and/or the internet to investigate one of these DBMSs: DB2, SQL Server, MySQL, Oracle, or Sybase. Prepare
tigry1 [53]

Answer:

The definition for the problem is listed in the section below on the explanations.

Explanation:

<u>For SQL Server</u>

  • Data Recovery: Data recovery is done well on SQL Server. It is achieved by the restoration method. Behind this, a sysadmin must reconstruct a collection of SQL backups throughout a restore series that is technically right as well as relevant.
  • Data Security: There are several approvals as well as limits for accessing main data objects or databases. These data are accessed only by the approved clients.
  • Concurrency Control: This is essentially synchronization of the evidence or information accessed by multiple users as well as from separate locations.

Concurrency or Competitiveness control becomes accomplished with SQL Server Portable, using locking to further improve security. The locking regulates how multiple individuals can simultaneously navigate & alter shared storage, without interfering with one another.

8 0
3 years ago
You use a(n) ____ program to create, send, receive, forward, store, print, and delete e-mail messages.
tigry1 [53]

Answer:

B - E-Mail

Explanation:

This is a program to create, send, receive, forward, store, print, and delete e-mail messages.

3 0
3 years ago
CPT, which is used to code procedures in an office, is an example of a/an
ExtremeBDS [4]
 <span>Current Procedural Terminology

is used for general check up

</span>
3 0
3 years ago
Other questions:
  • Which is the most important reason you should properly cite information that you obtain from an Internet search? Question 2 opti
    8·1 answer
  • A grade of B is worth Grade points<br><br><br> A) 3.0<br> B) 80<br> C)2.0<br> D)4.0
    13·2 answers
  • Double click on a sheet tab to ______ the sheer
    9·2 answers
  • Write a method called sum with a while loop that adds up all numbers between two numbers a and b. The values for a and b can be
    11·2 answers
  • Study the images of two different fronts.
    7·2 answers
  • How to get free PS5?
    8·2 answers
  • All languages require the code which is simply a word that means _____.
    9·1 answer
  • _____ have networked and texted all of their lives with smartphones, tablets, and high-speed Internet.
    8·1 answer
  • Print numbers 0, 1, 2, ..., userNum as shown, with each number indented by that number of spaces. For each printed line, print t
    8·1 answer
  • __________ is a software-enabled technique that can change the hardcoded mac address to any mac address and thus overcome mac ad
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!