1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kari74 [83]
4 years ago
12

Encryption ensures that only the intended recipient will have the ____ necessary to view an encrypted file’s contents.

Computers and Technology
1 answer:
rewona [7]4 years ago
7 0

Answer:Key

Explanation:

In cryptography Encryption is the process of encoding the confidential data in such a way that only intended recipient can decode it by decoding it with the help of a suitable key.

Encryption is used in almost every data transmission such that the senders data can only be viewed by receiver without the interference of outsider.

You might be interested in
True or False: You cannot restore a deleted file on a volume protected by the Recycle Bin. Select one: a. False b. True
artcher [175]

Answer:

The answer is false

Explanation:

When you delete a file imagine you are erasing the path there. The file still will exist until it is wrote over. If you wish to retrive it many programs can do it for you.

5 0
4 years ago
What kind of resources can we share over the network? Plzzzzzzzz help!!!!!!
lubasha [3.4K]

Sharing network resources requires abiding by certain constraints, as follows:

<span>Security: Organizations present ongoing opportunities for unauthorized shared resources. Security mechanisms should be implemented to provide efficient parameters.Compatibility: Various client-server operating systems may be installed, but the client must have a compatible OS or application to access shared resources. Otherwise, the client may encounter issues that create communication delays and requires troubleshooting.Mapping: Any shared OS hardware drive, file or resource may be accessed via mapping, which requires a shared destination address and naming conventions.<span>File Transfer Protocol (FTP) and File Sharing: FTP is not affected by shared resources because the Internet is FTP’s backbone. File sharing is an LAN concept.</span></span>
3 0
4 years ago
Read 2 more answers
alendar year. The current calendar is called the Gregorian calendar, was introduced in 1582. Every year divisible by four was cr
madam [21]

Answer

Tough question.

i dont know

Explanation:

4 0
3 years ago
An ______ is a major type of KM that collects, stores, and disseminates digital content and knowledge
Luba_88 [7]

Answer:

enterprise-wide km

3 0
3 years ago
Which of these is NOT a good presentation technique?
erastova [34]
The answer would be D.
3 0
3 years ago
Read 2 more answers
Other questions:
  • What is a device driver?
    9·2 answers
  • Practice Home Survey
    14·1 answer
  • What are the methods or permissions needed to view the passwords for linux and unix?
    15·1 answer
  • Joshua is creating his résumé, in which section will he add projects and trainings he was involved in?
    10·1 answer
  • Which topology enables only one person, at one time, to send data to others on the network?
    6·1 answer
  • Siona needs to make sure her ads are getting a minimum number of impressions on the top of the page. What type of automated bidd
    10·1 answer
  • What are the 6 external parts of a computer system
    5·1 answer
  • You install a new driver, but your device still doesn't work. What is the first thing you should do?
    14·1 answer
  • Sensory cues are used for script writers to be able to get more creative with the story their are scripting for (i.e.
    15·1 answer
  • Question # 4
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!