1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Natasha2012 [34]
3 years ago
15

An Internet user has a need to send private data to another user. Which of the following provides the most security when transmi

tting private data?
a. Certifying the data with a Creative Commons license before sending it
b. Sending the data using a high-bandwidth connection
c. Sending the data using public-key encryption
d. Sending the data using a corporate email server
Computers and Technology
2 answers:
Nezavi [6.7K]3 years ago
6 0

Answer:

C. Sending the data using public-key encryption

Explanation:

Encryption is the only choice that provides security.

Vilka [71]3 years ago
5 0
The correct answer would be A
You might be interested in
( answer goes here) are pictures that you can click on to tell your computer what to do.
rosijanka [135]
Um what are you asking here?
8 0
3 years ago
Read 2 more answers
In animation what is exaggerated to make the characters more intensely what they are​
aleksklad [387]

Answer:

Exaggerated used of the technique can produce a comical effect, while more realistic animation must time the actions exactly to produce a convincing result. Slow in and slow out. Adds more frames near the beginning and near the end of a movement, and fewer in the middle, to make the animation appear more realistic.

5 0
3 years ago
Which of the following is not hardware? Question 7 options: A) Wireless network router B) Printer C) Virus Scanner D) Flat-panel
jok3333 [9.3K]

the answer is virus scanner which is not hardware but software because if you didn't know hardware is stuff like a monitor a mouse a battery a case that's all stuff you can generally touch even the hardware inside the computer you can touch where as virus scanner you can not touch because its software again my point being its software NOT hardware

8 0
3 years ago
An independent frame that holds a program, document, or folder contents in windows 7 is called a ____.
svetlana [45]
Window.

Have a wonderful day!~
7 0
3 years ago
Virtual machines are not susceptible to the threats and malicious attacks like other operating systems.
Nonamiya [84]

Answer:

flamingo was here

Explanation:

3 0
3 years ago
Other questions:
  • you were discussing software privacy with a friend were surprised to learn how software privacy can impact your life everyday. w
    10·1 answer
  • Which of the following commands is more recommended while creating a bot?
    9·1 answer
  • I dopped my Fujifilm Instax mini 8 and now the case won't close and it takes blank pictures can anyone tell me what to do, pleas
    6·2 answers
  • The part of the computer that provides access to the internet is the?
    14·1 answer
  • What parts of the computer does it not need to function?​
    9·1 answer
  • Please help with attached file
    8·2 answers
  • What is a project?
    5·2 answers
  • how many usable host addresses are available for each subnet when 4 bits are borrowed from a class C IP address
    11·1 answer
  • I need help 50 points and brainless if you answer
    7·1 answer
  • Which of the following is a productivity strategy for collaboration?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!