1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Rzqust [24]
3 years ago
7

As described in class, what does the sender send to the receiver when using hashing for integrity and authentication? (Do not in

clude information previously shared / agreed upon by the sender and receiver.)
Computers and Technology
1 answer:
Nataliya [291]3 years ago
6 0

Answer:

The answer is "secret key k".

Explanation:

When the sender sends the message, he/she may combine, it with the hidden key, and determines the hashing, when transmitting the information the digest is being sent, and also the message is transmitted through the connection.

when the receiver receives the message, still having the very same secret key, adding the Hidden Key then recalculating the hashing again. In this, two factors if another subsequent digest matches something, this message is sent.  

  • During transit, the message was certainly not changed.
  • Anybody with the private key – preferably even a preferred sender sent out this letter.
You might be interested in
Taking these steps will help to improve the delivery of your presentation.
NNADVOKAT [17]

Taking any/all of these steps will help to improve the delivery of your presentation:

<em>==> Be familiar with the place the presentation will be given.</em>

<em>==> Practice your presentation.</em>

<em>==> Move away from your computer frequently while speaking, and return to it to advance slides.</em>

<em>==> Use your conversation words and voice.  Don't read it from a paper (unless you can write in conversational words and phrases, but this is really hard to do).</em>

<em>==> Look around the audience while you're talking.  Make eye-contact with people. </em>

<em>==> Let your hands move normally while you talk.  Smile.</em>

-- Read from your slides so you don't forget your content.   ==> No. This is considered one of the signs of a poor presentation, and an inadequately prepared presenter.  

You're not there to read the slides to your audience.  They can read the slides just as well as you can.  You're there to explain, embellish, enhance, and enlarge the material on the slides.  If you don't have any more to tell them except what's on the slides, then you don't even need to drag yourself or the audience through the agony of the presentation. Just print the slides onto a handout, hand it out, dismiss the audience, and take the rest of the day off.  

Also, you're expected to know your subject well enough so that you don't need to read your slides to know what you're talking about, and to be well enough prepared to remember what comes next.

5 0
3 years ago
Read 2 more answers
1 Which one of the following is a transmission
ElenaW [278]

Answer:

d

Explanation:

All of the above can be means by which signals or information is transferred.

5 0
2 years ago
How are sorting tools helpful for using spreadsheets and databases? Sorting tools let you locate information by searching for na
Black_prince [1.1K]

Answer:

Sorting tools allow you to organize data into columns and rows that help you locate what you are looking for.

Explanation:

Spreadsheet applications and relational databases are similar in configuration as they are both arranged in rows and columns (tabular). Sorting a spreadsheet or database is useful as it helps to organize data. A sorted spreadsheet or database can be in ascending or descending order which makes it easier and faster to locate rows of data manually or by query.

7 0
3 years ago
Read 2 more answers
Information that indicates ground air or navy force levels or dispositions is what security?
AlexFokin [52]

Information that indicates ground air or navy force levels or dispositions is <u>confidential</u> security.

Security for a country's higher organizations is essential for a nation's protection.

Serious information like the nuclear organizations, army, navy, and ground air is at a higher risk for threats and hence requires higher security.

The information in such higher organizations is kept confidential and no third person is allowed access to the code of conduct of such organizations.

If information is leaked from the ground air or from navy force levels then there can be serious consequences for it. Hence, such information is always kept under confidential security.

To learn more about security, click here:

brainly.com/question/25375059

#SPJ4

8 0
2 years ago
While traveling in India, Sabina notes all of her daily expenses in rupees in her spreadsheet. At the end of the day, she wants
Contact [7]
Use currency conversion dialog box select rupee to us dollar
8 0
3 years ago
Other questions:
  • The picture that graphically represents the items you use in Windows is called a/an
    11·1 answer
  • Meaning of page break​
    8·1 answer
  • How would you define media literacy?
    12·1 answer
  • _____ is an example of a professional networking site where you keep in touch with business contacts.
    9·1 answer
  • Which line of code will only allow a symbol to be stored in a variable?
    11·2 answers
  • 5 negative impacts of digital life Explain
    9·1 answer
  • Which picture should i put as my profile picture.
    15·2 answers
  • Hello guys please help me <br>list and identify the components of computer ​
    15·1 answer
  • FoRWarD MaRcH AND hERe We Go MEMbers of the agEncy BaKuGO AHHHHHHHHH-
    10·2 answers
  • Hey everyone please let my friends answer please?????? .
    12·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!