1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Rzqust [24]
3 years ago
7

As described in class, what does the sender send to the receiver when using hashing for integrity and authentication? (Do not in

clude information previously shared / agreed upon by the sender and receiver.)
Computers and Technology
1 answer:
Nataliya [291]3 years ago
6 0

Answer:

The answer is "secret key k".

Explanation:

When the sender sends the message, he/she may combine, it with the hidden key, and determines the hashing, when transmitting the information the digest is being sent, and also the message is transmitted through the connection.

when the receiver receives the message, still having the very same secret key, adding the Hidden Key then recalculating the hashing again. In this, two factors if another subsequent digest matches something, this message is sent.  

  • During transit, the message was certainly not changed.
  • Anybody with the private key – preferably even a preferred sender sent out this letter.
You might be interested in
What's the biggest security issue with using social networking sites to market your listings?
Savatey [412]

The biggest security issue with using social networking sites to market your listings is Criminals may use social networking sites to identify your personal data.

<h3>What is a social marketing site?</h3>

A social marketing site is a site where people from around the world are connected in one place and share their thoughts and photos and other data.

The social sites are on the internet and there is a chance of stealing data and it identity theft, phishing, online predators, internet fraud, and other cybercriminal attacks are also some risks.

Thus, the largest security concern with using social networking sites to sell your listings is that thieves could use these sites to find personal information about you.

To learn more about social marketing sites, refer to the link:

brainly.com/question/15051868

#SPJ4

6 0
1 year ago
Which of the following statements are true regarding technology and learning? Select 3 options.
bekas [8.4K]

Answer:

<h2>Knowledge can be acquired throughout your life, through both formal and informal methods.</h2>

As long as a person is alive, they can keep learning. With the amount of knowledge available in the world, it is improbable that a person can acquire all of it before they pass on. It is therefore possible to acquire information until the day a person dies.

<h2>Changes in technology both enable and require lifelong learning.</h2>

Technology keeps changing and developing in order to make things better and more efficient. As such, humans need to keep learning for their entire lives or else they will be left behind as newer technology comes out. Take smartphones for instance, a lot of older grandparents have had to learn how to use them to keep in contact with with their families.

<h2>Virtual reality simulations are being used for training in industries like healthcare and the armed forces.</h2>

Virtual reality has improved the effectiveness of training in both the medical and armed forces industry because with training capable of being done in a virtual world, it can be more in-depth. For instance, medical students can use more realistic subjects to learn the intricacies of the human body and soldiers can embark on dangerous training missions without actually risking their lives.

5 0
3 years ago
Which of the following terms means to take notes from a resource in your own words
Elan Coil [88]
Paraphrase is the correct answer
8 0
3 years ago
Read 2 more answers
Presentations are used to communicate______ or to help persuade someone of a new idea. A good presentation will contain a mix of
kvv77 [185]
Just quizlet it believe me it will help 100%
7 0
3 years ago
What is the purpose of external firewalls? to prevent users from accessing sensitive human resource or financial data to limit a
ziro4ka [17]
<span>keep out unauthorized internet users from intranet networks

All firewalls are used to control the traffic between networks to only allowed traffic.
</span>
3 0
3 years ago
Other questions:
  • Show the contents of a queue after the following operations are performed. Assume the queue is initially empty. enqueue(45); enq
    6·1 answer
  • How can you tell that a website is valid and reliable 10 points
    10·1 answer
  • What phrase indicates someone has knowledge and understanding of computer,internet,mobile devices and related technologies?
    6·1 answer
  • An electronic spreadsheet is a type of<br> archive.<br> database.<br> document.<br> periodical.
    15·2 answers
  • What was one complication caused by the tsunami that struck japan in 2011?
    15·1 answer
  • Question 2 of 5
    8·1 answer
  • Read first a user's given name followed by the user's age from standard input. Then use an ofstream object named outdata to writ
    6·1 answer
  • Can some one help sorry I just so confused on this and I keep failing it I just need the help So choose the best answers
    12·1 answer
  • Which HTML tag is formatted correctly?
    7·1 answer
  • Ví dụ sau sẽ in ra dữ liệu của x là kiểu gì ?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!