1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
frez [133]
3 years ago
15

A coffee shop is considering accepting orders and payments through their phone app and have decided to use public key encryption

to encrypt their customers' credit card information. Is this a secure form of payment?
Yes, public key encryption is built upon computationally hard problems that even powerful computers cannot easily solve.
No, encryption is an issue in that case
Computers and Technology
1 answer:
Charra [1.4K]3 years ago
8 0

Answer: Yes

Explanation:

Public key encryption is the encryption technique that is used for private keys and public keys for securing the system.Public key is used for encryption and private key is for decryption.Public keys can only open content of the system

  • According to the question, public key encryption is secure for coffee shop customer payment process as they are stored on digital certificates in long form for verifying digital signature and encrypting information.Its computation is difficult to crack through power computer access.  
  • Other options is incorrect as encryption is not a problem for payment procedures. Thus, the correct option is yes ,public key encryption is secure method for coffee shop customers .
You might be interested in
| HELP PLS! C++ Sorting arrays can be performed using either Selection Sort or Insertion Sort or
Sholpan [36]

Answer:

wwhwwwwnlcw lcwl. wl w l. w la a. a. ac aa cw w w w. w. w. w w. ww w. w w w. w w w ww w w. w w ww. w cs s js jw jw kw kw ks jpsbp svkhs ksl oheo

8 0
3 years ago
Why must an rodc be able to connect to at least one windows server 2008 or higher domain controller?
raketka [301]
<span>Ensure that at </span>least one<span> writable </span>DC<span> must be running </span>Windows Server 2008<span> or higher before you can deploy a Read-Only-Domain-Controller.</span>
6 0
3 years ago
The "edit" command must allow the user to find a record in the list by director. If there are multiple records with the same dir
sveticcg [70]

Answer:

To allow user to assign rating

Explanation:

The basic function of “rate” command is to give opportunity to the user to assign a value to a song from the range of 1 – 5.

In the range, the value of 1 indicates the lowest rating, while value of 5 is the highest rating that can be obtained.

Any previous ratings are then replaced by the new rating assigned from the range of 1 – 5.

7 0
3 years ago
How do you enlarge your screen if there is no control panel? Need desperate help!
igor_vitrenko [27]
You hit ctrl than the plus/equal sign Hope that helped! 
4 0
3 years ago
A polyalphabetic cipher uses many ___
Greeley [361]

Answer:d) Mono-alphabetic substitution rules

Explanation: Poly-alphabetic cipher is the cryptography that is done by using the many alphabets in substitutional way. They are supposed to have a good security because they use cipher text alphabets for the encryption and then decrypts it.

Substitution of the alphabets is done by the rule of the mono-alphabetic substitution rules.Other given options are incorrect because they are not used in the cryptography of the alphabetic cipher. Thus option (d) is the correct answer.

3 0
3 years ago
Other questions:
  • If you were optimizing for performance and wanted to support potentially adding many new elements to an adt, then:
    12·1 answer
  • What isthe concept of packets, give example?
    9·1 answer
  • What does the "configure dhcp options for proxy dhcp" option do?
    13·1 answer
  • Write a function chat accepts a pointer to a C-string as its argument. The function should count the number of vowels appearing
    5·1 answer
  • Excel solver does not allow for the inclusion of greater than or equal to
    9·1 answer
  • PLEASE HELP ASAP!!!
    8·1 answer
  • What are the OSHA construction standards also called ?
    10·1 answer
  • Choose the correct answer
    6·1 answer
  • Why is John Von Neumann to a remarkable name?<br>si​
    15·1 answer
  • Write an algorithm (in pseudocode) for the following Scenario.
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!