1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Artemon [7]
3 years ago
7

A computer user is listening to an audio broadcast on the internet through an ssl vpn. the type of encryption cipher used in thi

s case is:
Computers and Technology
1 answer:
Step2247 [10]3 years ago
5 0
The answer is <span>Block cipher.  </span><span>A </span>block cipher<span> is a method of </span>encrypting<span> text </span><span>in which a cryptographic key and algorithm are applied to a </span>block of data at once as a group rather than to one bit at a time.  They<span> split the input text into fixed-size chunks called  </span>blocks<span>. The operation of a </span>block cipher<span> is to take a </span>block<span> of input text and a </span>block<span> of key to produce a </span>block<span> of output text.</span>
You might be interested in
Write a program that prompts the user to enter a point (x, y) and checks whether the point is within the rectangle centered at (
Serga [27]

Answer:

## http://pastebin.com/nQWtHb3B

#use above link for formatted program #Python3

c=[float(cord) for cord in input('Enter a point with 2 coordinate :').split(' ')]

base=[0,0]

w=10

h=5

if((abs(c[0]-base[0])<= float(w)/2) and (abs(c[1]-base[1])<= float(h)/2)):

print('Point (',c[0],', ',c[1],') is in the rectange')

else:

print('Point (',c[0],', ',c[1],') is not in the rectange')

5 0
3 years ago
Characteristics of successful entrepreneurs include
crimeas [40]
The answer would be A because grit means to fight hard to get what you want. Submission would be to give in to pressure and give up. Self-importance would be to only focus on yourself and no one else. A short attention span would not work out for you because you get distracted easily.
8 0
3 years ago
CIST 1122 Project 2 Instructions
NikAS [45]

Answer:

it is suppost ro be at

least 20 tb

Explanation:

5 0
3 years ago
What computer company was founded in 1975?
erica [24]
Microsoft company was founded in 1975
6 0
3 years ago
How do you know when a spreadsheet object is active in a powerpoint presentation?
Ira Lisetskai [31]
It should be under lined, when you press it it should have a different colour
4 0
4 years ago
Other questions:
  • How important is technology in education? what technology-related skills can you contribute to a school district answers?
    13·1 answer
  • 14<br> Select the correct answer.<br> Which activity is a marketing technique?
    9·1 answer
  • Matching: match each step with its correct sequence number. This question tests whether you know the order in which a CPU perfor
    14·1 answer
  • A(n) _____ is a computer program that can damage files and programs on your computer.
    6·2 answers
  • What did I do wrong? May you please correct it for me...I was also looking on how to delay when it prints. Like when it prints a
    9·1 answer
  • Microsoft windows malicious software removal tool fake or real
    8·1 answer
  • ______ are used to store all the data in a database.
    7·1 answer
  • _________ can be used to provide access control, confidentiality, data origin authentication, connectionless integrity, rejectio
    12·1 answer
  • What is a disadvantage of communicating on social media?
    14·1 answer
  • What is a circular network.​
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!