1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Natasha2012 [34]
3 years ago
15

An Internet user has a need to send private data to another user. Which of the following provides the most security when transmi

tting private data?
a. Certifying the data with a Creative Commons license before sending it
b. Sending the data using a high-bandwidth connection
c. Sending the data using public-key encryption
d. Sending the data using a corporate email server
Computers and Technology
2 answers:
Nezavi [6.7K]3 years ago
6 0

Answer:

C. Sending the data using public-key encryption

Explanation:

Encryption is the only choice that provides security.

Vilka [71]3 years ago
5 0
The correct answer would be A
You might be interested in
The keywords used in programming languages that use decisions to redirect the flow of a program are called ________. A.flowchart
Zina [86]

Answer:

Option B is the correct answer for the above question.

Explanation:

The control structure is a decision type structure which can be either true or false. It has two options-- If this then, does this otherwise do this. When the user wants to write he control structure then he can do this by the help of the following syntax in python language--

if(condition):

do this

else:

do this

The above question wants to ask about the concept which is used in the programming for a decision then the answer is control structure which is referred from the option B. Hence B is the correct option while the other is not because--

  • Option A states about the flowchart which is the picture form of the instruction.
  • Option C states about the pseudocode which is the language form of the instruction.
  • The operator is also not the correct option because it is used to perform the operation.

6 0
3 years ago
You want high availability for DHCP services, a primary server to handle most DHCP requests, and a secondary server to respond t
babymother [125]

Answer:

The blocking system.

Explanation:

In order to avoid servers to replicate with each other, I should configure the blocking system of the first DHCP.

For example, if the first DHCP fails to respond, the second will get in place, however, I have to configure the first system that immediately that the second DHCP starts working, the first blocks its information and use.

By this way, there won´t be any duplicated actions or reponses.

5 0
3 years ago
Describe at least one reason why transitioning from the Cisco implementation of STP to the Cisco implementation of RSTP is seaml
kherson [118]

Answer:

STP mainly uses 5 states in a network, in which some states are replaced in RSTP which improves the time efficiency.

Explanation:

STP mainly uses five states i.e.  Learning, Listening, Blocking, Disabling and Forwarding to overcome the problem of collision in a network.  

RSTP replaced the three states of STP i.e listening, learning, and blocking by Discarding, which results in the time efficiency as compared to STP.  

As STP takes minutes to complete the network inter connectivity, RSTP completes it in seconds.

This is one of the main reason why an administrator want to change to RSTP.

6 0
3 years ago
What's the component of the hardware?​
melisa1 [442]
Some component of the hardware are central processing unit (CPU), monitor, mouse, keyboard, computer data storage, graphics card, sound card, speakers and motherboard.

I’m sure theirs more but here’s so. Hope this helps!
7 0
3 years ago
Read 2 more answers
..........................................
Scilla [17]

Answer:

jhhgvjgfhvbnbjvjn

Explanation:

7 0
3 years ago
Read 2 more answers
Other questions:
  • Which situation is an example of? "relational context" in the transactional model of? communication?
    12·1 answer
  • Consider a hypothetical microprocessor generating 16-bit addresses with 16-bit data accesses (i.e. each access retrieves 16 bits
    9·1 answer
  • How do I add and accept a friend on this app?
    10·1 answer
  • Componets of computer
    5·1 answer
  • Match each career with the education required for each job
    12·1 answer
  • What is the meaning of the word joystick
    6·2 answers
  • For which type of long-distance call do you need to tell the operator the name of the person to whom you wish to speak?
    10·1 answer
  • A computer essentially takes input, processes it, and produces output. Which person developed a machine in the mid-1880s that ac
    6·1 answer
  • Can someone please explain binary addition to me? i have a test tomorrow yikes
    14·1 answer
  • In the NumPy function, the data preparation technique that is used to help machine learning algorithms is called _________.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!