1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Harlamova29_29 [7]
3 years ago
6

In public-key encryption, the two keys–one for coding and one for decoding–are known as ________.

Computers and Technology
1 answer:
Feliz [49]3 years ago
5 0
Public key and private key  - In public key encryption, a pair of keys is used (public key and private key). The public key can be made available publicly, while the private key is only known  by the owner. The public key is used to encrypt the message, while the private key is used to decrypt the message.
You might be interested in
Share a bit about your experience using Microsoft so far
Andru [333]
Microsoft is very useful for what I do it decently priced for Microsoft word
7 0
3 years ago
What are the steps to add text in Kinzoa Movie Maker?
ella [17]

Answer:

There should be a tab titled "add text." Click on that and add your text.

Explanation:

8 0
3 years ago
Big data are used to _____. Select 3 options.
Anon25 [30]

Answer:

Big data are used to _____. Select 3 options.

understand people’s hobbies

analyze people’s interests

make decisions about marketing

Explanation:

100%

8 0
3 years ago
Suppose Alice and Bob are sending packets to each other over a computer network. SupposeTrudy positions herself in the network s
Elden [556K]

<u>Explanation:</u>

  • can observe the contents of all the packets sent and even modify the content.
  • can prevent packets sent by both parties from reaching each other.

From a network security standpoint, since we are told that Trudy <em>"</em><em>positions herself in the network so that she can capture all the packets sent", </em>it, therefore implies that the communication between Alice and Bob is vulnerable to modification and deletion.

6 0
3 years ago
QUESTION 1 Someone may choose to own a car instead of leasing because: AThe car can be resold later to make some money back. BTh
Lorico [155]
This is not a computers and technology question but ill still answer it and the answer to this that i think it is ...A ...but i may be wrong
3 0
3 years ago
Other questions:
  • . What is the output of this code sequence?
    8·1 answer
  • In Windows, the log that stores events from a single application or component rather than events that might have system wide imp
    14·1 answer
  • List the applications in the CyberOps menu.
    15·1 answer
  • What was the original motivation for developing the internet?
    7·1 answer
  • What is the key function of a sales team?
    13·1 answer
  • Kerry wants to save her file but give it a new name. Kerry should use the ____ command
    7·1 answer
  • 2) Show the decimal equivalent of each of the numbers if they are interpreted as (4 answers): 11001101 01101001 a. Unsigned bina
    15·2 answers
  • Which language is written using 0s and 1S​
    11·1 answer
  • A file named loan.html, write an HTML document that looks similar to figure 9-7 in the textbook. Write four functions with these
    8·1 answer
  • What is a phone made out of dna
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!