1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
frez [133]
3 years ago
15

A coffee shop is considering accepting orders and payments through their phone app and have decided to use public key encryption

to encrypt their customers' credit card information. Is this a secure form of payment?
Yes, public key encryption is built upon computationally hard problems that even powerful computers cannot easily solve.
No, encryption is an issue in that case
Computers and Technology
1 answer:
Charra [1.4K]3 years ago
8 0

Answer: Yes

Explanation:

Public key encryption is the encryption technique that is used for private keys and public keys for securing the system.Public key is used for encryption and private key is for decryption.Public keys can only open content of the system

  • According to the question, public key encryption is secure for coffee shop customer payment process as they are stored on digital certificates in long form for verifying digital signature and encrypting information.Its computation is difficult to crack through power computer access.  
  • Other options is incorrect as encryption is not a problem for payment procedures. Thus, the correct option is yes ,public key encryption is secure method for coffee shop customers .
You might be interested in
What was the first 1.0.1 version of openssl that was not vulnerable to heartbleed?
vovikov84 [41]
I suggest you to read OpenSSL changelogs to make it more clear. As there's not enough space to describe how it works. But heartbleed resistan version was 1.0.2, as I know.
5 0
3 years ago
Read 2 more answers
1. Which markup language adds the ability to use video without requiring the user to download add-ons?
aniked [119]

HTML5

HTML5 has fewer plug-ins like the ability to standardize how audio and video are presented on a Web page. It introduces the <video> element designed to remove the need to install 3rd party add-ons and plug-ins like adobe flash player. It also adds the <audio> element  too that allows pages to smoothly add audio files.

3 0
3 years ago
Observation and screening data should not influence curriculum development true or false?
Anton [14]

Answer:true

Explanation: we cant rely on computers

8 0
2 years ago
What does the ‘SIM’ in the SIM card stand for?
hram777 [196]

Answer:

It stands for Subscriber Identity Module

Explanation:

<em>SIM cards are computer chips that store data and enable you to access your network. That implies you may call, text, and connect to mobile internet services such as 4G. SIM cards are  portable, and you can store messages, contacts, and emails to them. SIM cards connect a specific account to a specific phone; they inform the phone network firm which account is linked to which phone. Customers are typically referred to as subscribers by network operator providers. A SIM card is a type of user card that allows your phone to connect to a network. Also, if you had a phone accidents and you can s imply insert the SIM card in another phone and you may make a call or utilize your data. Just make sure they each utilize the same size SIM card.</em>

4 0
2 years ago
Read 2 more answers
A centralized computer that allows multiple remote users to share the same printing device is referred to as a _________
lys-0071 [83]

Answer:

central server

Explanation:

This is client-server technology, where the centralized computer with the printing device is playing the role of the central server, and the multiple remote users are the clients. Thus a client-server architecture is established. And this enables remote users to share the same printing device, which is possessed by the central server. Hence, the correct answer here is the central server.

7 0
3 years ago
Other questions:
  • Which of the following is a social news-sharing service?
    10·2 answers
  • Do you think engineers have to adapt their original plans during the construction of systems or products? Why might they?
    6·1 answer
  • A lever has an effort arm that is 8 meters long and the residence (load) arm that is 1.5 meters long, how much effort is needed
    7·1 answer
  • Write an assembly language program with a loop and indexed addressing that calculates the sum of all the gaps between successive
    11·1 answer
  • printArray is a function that has two parameters. The first parameter is an array of element type int and the second is an int,
    10·1 answer
  • What is the difference between a sequential program and an event-driven program?
    9·1 answer
  • When creating a chart or graph, which should be completed first?
    9·2 answers
  • ---------------is a systematic review of a person’swork and achievements over a recent period, usually leading toplans for the f
    11·1 answer
  • Write a set of nested loops that display 10 rows of # characters. There should be 15 # characters in each row.
    15·1 answer
  • Any anime weebs wanna talk
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!