1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
n200080 [17]
3 years ago
11

What is the purpose of exporting your public key to the directory services server?

Computers and Technology
1 answer:
Natalka [10]3 years ago
5 0

Answer:

The main reason for exporting your public key to the directory services server is simply to enable others to encrypt messages that they want to send to you. If you do not export your public key to the directory services server, people can still send messages to you, but they will be unencrypted messages.

The encrypted messages sent to you can be decrypted using your private key.

Explanation:

You might be interested in
Before entering a road from an alley or driveway, you must:Flash your high beam headlights 
JulsSmile [24]

Stop before reaching the sidewalk. Hope this helps

3 0
3 years ago
A series circuit contains a generator, two devices, and connecting wires. The resistances of the two devices are 15 ohms and 10
rjkz [21]
We know, Voltage drop = Voltage * Resistor / total resistance
Here, voltage = 75 V
Resistor for cal. = 10 Ohm
Total resistance = 10 + 15 = 25 Ohm

Substitute their values,
e = 75 * 10/25
e = 3 * 10
e = 30 V

In short, Your Answer would be Option B

Hope this helps!
6 0
4 years ago
Read 2 more answers
What laws are broken when you hack someone?
postnew [5]

Answer:

it depends

Explanation:

if you are hacking for a purpose that is benefiting the person being hacked, that is ethical hacking. ethical hacking is not illegal, as long as you get permission from the person being hacked.

if you hack someone without their knowledge, that is unethical hacking, and that is in many cases, a crime, and if it has enough of a detrimental effect on a companys process, it could land you into prison and earn you a hefty fine.

ethical hacking is good for testing a networks security, and if all is well, the ethical hacker shouldnt be able to get into a network if it is secured properly.

6 0
3 years ago
A school at which you are likely to be accepted because you meet graduation requirements is called a:
zloy xaker [14]
The answer for Apex College and Career Prep 2 would be Probable College. 
7 0
3 years ago
2. Name the layer of the Web/Internet Protocol Stack with which each of these functions is associated.
Nadya [2.5K]

Answer:

a. Encrypt a message - Application layer

b. Prevent buffer overruns - Transport Layer

c. Choose the best route for a data packet - Network Layer

d. Compose an email message - Application layer

Explanation:

3 0
3 years ago
Read 2 more answers
Other questions:
  • You are given a network of 10.50.24.0/21, which contains 2,048 addresses. what subnet mask should you use to divide this into fo
    7·1 answer
  • What are the latest technology in 2014
    11·1 answer
  • What is the output of the following code fragment? int i = 1; int sum = 0; while (i <= 15) { sum = sum + i; i++; } System.out
    5·1 answer
  • PHP server scripts are surrounded by delimiters, which? *
    5·1 answer
  • Assignment 4: Evens and Odds
    9·1 answer
  • __ allow(s) users with mobility issues to control the computer with their voice.
    6·2 answers
  • Jettison folk 2007, Magnum opus, be moving, offers poisoned commentary on the film industry.
    7·1 answer
  • Which sentence describes a biotechnology method of treating sulfur liquor in the paper industry?
    11·1 answer
  • A good machine should have the mechanical advantage of......?​
    7·1 answer
  • How much money did Uta initially invest?$180.00$320.00$352.48$471.70
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!