1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sveta_85 [38]
3 years ago
6

In symmetric encryption the same key is used to encrypt and decrypt a message. in asymmetric encryption different keys are used

to encrypt and decrypt. give at least one reason why asymmetric encryption is useful
Computers and Technology
2 answers:
Brrunno [24]3 years ago
5 0

A useful advantage of Asymmetric encryption over symmetric encryption is that there is no secret channel necessary for the exchange of the public key, unlike in the symmetric encryption which requires a secret channel to send the secret key.  

Another advantage of Asymmetric encryption is that is has increased security. Asymmetric uses two different keys (Public and private) for both encryption and decryption of data while symmetric uses one.

Bond [772]3 years ago
3 0
<span>Encryption is the process of securing the data or information by storing and even transmitting data with advanced principles of mathematics. in asymmetric encryption there is a concept of public key that is made available to anyone who wants the access and is passed over the internet and a private key which attained by just one person. One reason asymmetric encryption is useful because it is more secure because the ownership of the secure private key is held always with one person and the public key is shared to the associated ones.</span>
You might be interested in
Darren wants to substitute every occurence of the word bulky in his spreadsheet with the word strong. which of these options sho
Kaylis [27]
If you wanted to remove all the occurrences of bulky and replace them with the word strong. You would use replace all.
6 0
3 years ago
Janice is making her resume in which section should she include information about her previous employers , positions held , and
Volgvan

Generally, Janice should post information about her past employment in the Experience section, also often called as Professional Experience. The information that she should include is the name of the organization or company which previously employed her, her positions there, length of each position, and a description of what she did in the position.

4 0
3 years ago
This tag element is the last one used in the html code sequence
satela [25.4K]

Answer:

Looking closely at the HTML code sequence, it does seem that the tag element is the endpoint from where the HTML form gets the input, like input boxes, checkboxes, radio buttons, etc. And hence it is correct to say that the tag elements are the last one used in the HTML code sequence. And in the HTML code sequence head title script and styles comes at the top, and hence we mention the script or the Javascript code basically at the last, such that the HTML code or the web page run one time at least.

Explanation:

Please check the answer section.

3 0
4 years ago
2 of 10
ra1l [238]

Answer:

D

Explanation:

Just took the test

5 0
3 years ago
Which of the following is true of lossy and lossless compression algorithms?
taurus [48]

B. Lossy compression algorithms are typically better than lossless compression algorithms at reducing the number of bits needed to represent a piece of data.

7 0
3 years ago
Other questions:
  • A file containing user information which is transmitted from an online server and attached to your web browser and stored on you
    11·1 answer
  • You would like the user of a program to enter a customer’s last name. Write a statement thaUse the variables k, d, and s so that
    5·1 answer
  • What does it mean for a design to be content driven
    12·1 answer
  • Why did Herman Hollerith invent the Tabulating Machine?
    10·1 answer
  • When more open-ended questions are asked in a study group, discussions are more likely to
    14·2 answers
  • which scheduling algorithm allocate the CPU firt to the process that request the CPU first, (a) first come first serve,(b) short
    9·1 answer
  • PLZ PLZ PLZ PLZ HELP will mark brainlist What component contains the ROM (Read Only Memory)?
    5·1 answer
  • What is an algorithm?
    11·1 answer
  • How do u type please help
    11·2 answers
  • us refe rence: so 1 ac 2 2. describe the applications for merged documents in terms of the following benefits 2. describe the ap
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!