1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
galben [10]
3 years ago
5

To create a public key signature, you would use the ______ key.

Computers and Technology
1 answer:
olya-2409 [2.1K]3 years ago
4 0

Answer:

To create a public key signature, you would use the <u>_private_</u> key.

Explanation:

To create a public key signature, a  private key is essential to enable authorization.

A private key uses one key to make data unreadable by intruders and for the data to be accessed the same key would be needed to do so.

The login details and some important credentials to access user data contains both the user's public key data and private key data. Both private key and public key are two keys that work together to accomplish security goals.

The public key uses different keys to make data readable and unreadable.

The public key is important to verify authorization to access encrypted data by making sure the access authorization came from someone who has the private key. In other words, it's a system put in place to cross-check the holder of the private key by providing the public key of the encrypted data that needed to be accessed. Though, it depends on the key used to encrypt the data as data encrypted with a public key would require a private key for the data to be readable.

You might be interested in
How can you access the Help and Support system?
Ne4ueva [31]
By going to the person on the bottom and there should be a tab
5 0
3 years ago
Read 2 more answers
List any four e-commerce website​
Ipatiy [6.2K]

Answer:

Amazon. Founded in the US in 1994, Amazon started as an online bookstore that later diversified to products including media, electronics, apparel, furniture, food, toys, and jewelry.

eBay. ...

Walmart. ...

Etsy. ...

Home Depot. ...

Target. ...

Best Buy. ...

Wayfair.

5 0
3 years ago
Read 2 more answers
2. Voltage is:
jenyasd209 [6]
A. The force that moves electrons
6 0
3 years ago
7.1 Write statements that create the following arrays: A 100-element int array referenced by the variable employeeNumbers. final
maria [59]

Answer:

A. int [ ] numbers = new int[employeeNumbers];

B. double[ ] numbers = new double[payRates];

C. float[ ] miles = new float[14];

D. char[ ] letters = new char[1000];

7.2 Size of array cannot be negative

Size of array should be a positive integer and not decimal.

7.4 The size declarator is used in a definition of an array to indicate the number of elements the array will have. A subscript is used to access a specific element in an array.

7.5 subscript to be out-of-bound means the specified integer is not within the range of the length of the array.

Explanation:

The question has answer given for some. I guess the explanation is what is needed.

A. The general format of creating an array is:

data type[] arrayRefVar=new datatype[size];

In this case, the datatype is int, arrayRefVar is numbers, size is employeeNumbers. The size was already initialised to 100 (employeeNumber).

B. A wrong datatype was used.

double[ ] numbers = new double[payRates];

would create an array of size 25 which is the payRates with types double.

C. The array was re-written using the general format of creating an array is:

data type[] arrayRefVar=new datatype[size];

D. The array was correctly defined.

7 0
4 years ago
Which of the strategies below are likely to increase audience attention?
coldgirl [10]

Answer:

Use lots of different animation styles on each slide.

Explanation:

3 0
3 years ago
Other questions:
  • List five types of system information that can be obtained from the windows task manager. how can you use this information to co
    5·1 answer
  • In a token ring system, how quickly is the token passed around the circuit? 50 times per second millions of times per second hun
    11·1 answer
  • In two or more complete sentences, summarize the difference between renewable and nonrenewable resources? Justify your responses
    13·2 answers
  • can Results shown at the top of the Google search engine results page (SERP) always get high Needs Met ratings
    10·1 answer
  • GuardIN is an IT security firm. It deals with highly secure data for a wide variety of software and e-commerce agreements, trade
    7·1 answer
  • Given that<br>f(x) = 5x +3.<br>Find f (4)​
    15·2 answers
  • Which of the columns (A) to (I) in the truth table below is correct for the expression
    13·2 answers
  • A _is a short descriptive label that you assign to webpages, photos,
    10·1 answer
  • Create five circles like the Olympic Rings. fill them with the colors given below
    8·1 answer
  • Why does 5 g mm wave require more cells to achieve a better signal
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!