1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Rzqust [24]
3 years ago
7

As described in class, what does the sender send to the receiver when using hashing for integrity and authentication? (Do not in

clude information previously shared / agreed upon by the sender and receiver.)
Computers and Technology
1 answer:
Nataliya [291]3 years ago
6 0

Answer:

The answer is "secret key k".

Explanation:

When the sender sends the message, he/she may combine, it with the hidden key, and determines the hashing, when transmitting the information the digest is being sent, and also the message is transmitted through the connection.

when the receiver receives the message, still having the very same secret key, adding the Hidden Key then recalculating the hashing again. In this, two factors if another subsequent digest matches something, this message is sent.  

  • During transit, the message was certainly not changed.
  • Anybody with the private key – preferably even a preferred sender sent out this letter.
You might be interested in
Which numbering system is used for some network addresses, to describe colors
FromTheMoon [43]
Hexadecimal it describes locations in memory
5 0
3 years ago
True or False: Metadata is not visible to the website user
bonufazy [111]

Answer:

True

Explanation:

4 0
3 years ago
Read 2 more answers
What is an example of a reputable website
Keith_Richards [23]
A reputable website would be one that you could research online and read about it's history , reviews etc .
4 0
3 years ago
Read 2 more answers
ACL 1 has three statements, in the following order, with address and wildcard mask values as follows: 1.0.0.0 0.255.255.255, 1.1
larisa86 [58]

If a router tried to match a packet sourced from IP address 1.1.1.1 using this ACL, the first statement will be used.

a. First

<u>Explanation:</u>

We use ACL technology to make basic security level in the network.  ACL is strictly used to update the routing in the network and make sure network pears and make sure the flow control for network traffic is followed.

Since it is routing ip address through ACL statement. It all depends on how the network engineer routed the traffic in the network. A packet with source IP address 1.1.1.1 would match any of the three explicitly configured commands described in the question. As a result, the first statement will be used.

The router searches the ACL statement by order and when the match is found it stops execution of the ACL statement that will match with the first occurrence.

7 0
3 years ago
Can anyone do this flowchart chart for me could send it to my insta - chelsea.ejb
arlik [135]

Answer:

see attached picture

Explanation:

An algorithm would be:

if hours < 10 then bonus = 0

else if hours <= 15 then bonus = 1000

else if hours <= 20 then bonus = 1500

else if hours <= 25 then bonus = 2000

else if hours <= 30 then bonus = 3000

else bonus = 5000

6 0
3 years ago
Other questions:
  • this weekend you areplanning to complete part of your assignment at the library to do this you need to store data on a removable
    10·1 answer
  • . When you create a template class, ___________.
    15·1 answer
  • What is the order of arrangement of files and folders on a computer?
    15·1 answer
  • Which term describes the situation wherein a jury fails to reach a unanimous verdict? A occurs when a jury cannot reach a unanim
    14·1 answer
  • Tree diagrams are useful for
    12·1 answer
  • Select the correct answer.
    9·2 answers
  • You are splitting up all your apples equally between 3 people. which statement below will calculate how many apples will be left
    12·1 answer
  • Explain mechanical computer ,electromechanical and electronic computer with example<br>​
    11·1 answer
  • Biểu diễn cây sau bằng mảng một chiều
    12·1 answer
  • Yusuke has been a fan of online games for as long as she can remember. She particularly loves the role-playing games that allow
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!