1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
galben [10]
3 years ago
5

To create a public key signature, you would use the ______ key.

Computers and Technology
1 answer:
olya-2409 [2.1K]3 years ago
4 0

Answer:

To create a public key signature, you would use the <u>_private_</u> key.

Explanation:

To create a public key signature, a  private key is essential to enable authorization.

A private key uses one key to make data unreadable by intruders and for the data to be accessed the same key would be needed to do so.

The login details and some important credentials to access user data contains both the user's public key data and private key data. Both private key and public key are two keys that work together to accomplish security goals.

The public key uses different keys to make data readable and unreadable.

The public key is important to verify authorization to access encrypted data by making sure the access authorization came from someone who has the private key. In other words, it's a system put in place to cross-check the holder of the private key by providing the public key of the encrypted data that needed to be accessed. Though, it depends on the key used to encrypt the data as data encrypted with a public key would require a private key for the data to be readable.

You might be interested in
Write a program in C++ to Find the Average of the sum of prime numbers between 1 to any given number
mixas84 [53]

Using the knowledge in computational language in C++ it is possible to write a code that Find the Average of the sum of prime numbers between 1 to any given number

<h3>Writting in C++ code:</h3>

<em />

<em>#include <iostream></em>

<em>using namespace std;</em>

<em>bool isPrime(int n){</em>

<em>   for(int i = 2; i < n/2; i++){</em>

<em>      if(n%i == 0){</em>

<em>         return false;</em>

<em>      }</em>

<em>   }</em>

<em>   return true;</em>

<em>}</em>

<em>int findPrimeSum(int n){</em>

<em>   int sumVal = 0;</em>

<em>   for(float i = 2; i <= n; i++){</em>

<em>      if(isPrime(i))</em>

<em>         sumVal += i;</em>

<em>   }</em>

<em>   return sumVal;</em>

<em>}</em>

<em>int main(){</em>

<em>   int n = 15;</em>

<em>   cout<<"The sum of prime number between 1 to "<<n<<" is "<<findPrimeSum(n);</em>

<em>   return 0;</em>

<em>}</em>

See more about C++ code at brainly.com/question/19705654

#SPJ1

8 0
1 year ago
____ is the study of how computers can potentially improve without human programming.
Advocard [28]

Answer:

Machine Learning and/or Artificial Intelligence (AI)

5 0
1 year ago
PLZZZ HELLPP... PhotoShop
Burka [1]
LEFT SIDE :
Layer menu
Layer filters
Layer groups
Link layers

BOTTOM :
Layer effects
Layer menu
Visibility

RIGHT SIDE :
Add new layer
Opacity
Fill opacity

4 0
3 years ago
There are many potential risks associated with the internet. what do we call the distribution and access of illegal copies of di
GarryVolchara [31]

The potential risks that is linked with the use of internet as a resource point is known to be copyright infringement.

<h3>What is Copyright infringement?</h3>

This is known to be the creation of a book or any other resource material that has been copyrighted and protected without taking the granted permission of the copyright holder who is found to be the author of the work.

Note that The potential risks that is linked with the use of internet  resource point is known to be copyright infringement and one can be punish for it.

Learn more about copyright infringement from

brainly.com/question/14855154

#SPJ4

6 0
2 years ago
___ is a central part of continuous deployment?
nalin [4]
3 deployment pipeline
7 0
3 years ago
Read 2 more answers
Other questions:
  • Which connector is most commonly used to connect printers to desktop pc systems?
    10·1 answer
  • What is some effective writing techniques?
    7·1 answer
  • What is the most important for you to choose before you build a network?
    7·1 answer
  • Is it possible to have a deadlock involving only oneprocess? Explain your answer.
    11·1 answer
  • Tribology is a branch of physics concerned with friction in mechanical motion. Knowledge of tribology would be useful working wi
    14·1 answer
  • How much does a dodge tomohawk cost for a used one?
    7·1 answer
  • Which of the following describes a decision support system (DSS)?
    12·2 answers
  • How can you continue learning about computer science and improve your coding abilities?
    5·1 answer
  • ......... mi2hej<br><br>ejid8eo19o1b2bxhxjxjdnneejk2929nr
    5·2 answers
  • How do big organizations take back their data to be reviewed after a disaster?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!