1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
user100 [1]
3 years ago
5

For messages sent through an insecure channel, a properly implemented digital signature gives the receiver reason to believe the

message was sent by the claimed sender. While using a digital signature, the message digest is encrypted with which key?
Computers and Technology
1 answer:
stealth61 [152]3 years ago
6 0

Answer: the sender's private key.

Explanation:

For messages sent through an insecure channel, a properly implemented digital signature gives the receiver reason to believe the message was sent by the claimed sender. While using a digital signature, the message digest is encrypted with the sender's private key. When the message is being sent through the sender computes a hash function of the message and encrypts it with the sender's private key . When the message reaches its intended recipient it is decrypted and  the hash function is recomputed and compared to the digital signature to establish authenticity of the message and maintain its integrity.

You might be interested in
Your company has decided to replace several hundred hard drives. It would like to donate the old hard drives to a local school s
Tanzania [10]

Answer:

Drive Wipe F is correct

Explanation:

Drives content is virtual so it wouldn't work to shred or incinerate it. overwriting it wouldn't work to get rid of files exactly. it might get rid of the files but it would replace the files with other files.

3 0
3 years ago
Write a program that reads in ten numbers and displays the number of distinct numbers and the distinct numbers separated by exac
ELEN [110]

Answer:

The program to this question can be given as:

Program:

//import package.

import java.util.*;

public class Main //defining the class

{

public static void main(String[] args) //defining main method  

{

 Scanner ob = new Scanner(System.in); //creating scanner class object.

 int[] a = new int[10];//define array.  

 int number,counts= 0,i;//define variable.

 System.out.print("Enter numbers: "); //message.

 for (i = 0; i < 10; i++) //loop  

 {

  number=ob.nextInt();

  if (isDistinct(a,number))

  {

      a[counts] = number;//assign value in array

      counts++; // Increment count

  }

 }

 System.out.println("The distinct numbers is :" + counts);

 System.out.print("The distinct number are :");

 for (i = 0; i <a.length; i++)//loop

 {

  if (a[i] > 0)

  {

   System.out.print(" " +a[i]);//print array.    

  }

   

 }

 System.out.println();

}

public static boolean isDistinct(int[] array, int num)//defining method  

{

 for (int i = 0; i < array.length; i++)//loop for check number  

 {

  if (num == array[i]) //check condition

  {

      return false; //return value false.

  }

 }

 return true; //return value true

}

}

Output:

First time run:  

Enter ten numbers: 1 2 3 4 5 6 7 8 9 10

The number of distinct numbers is 10

The distinct numbers are 1 2 3 4 5 6 7 8 9 10

Second time run:

Enter numbers: 2 3 5 8 7 4 3 2 1 2

The distinct numbers is :7

The distinct number are : 2 3 5 8 7 4 1

Explanation:

The description of the above java code can be given as:

  • In the above java code, a class is defined that is main inside a class-main function is defined in the main function firstly creating a scanner class object that is "ob" then define variables and array that are number, counts and a[].
  • To inserts array elements we use a loop. In the loop, we use integer variable number and define a condition in if block passes a function that check value count total value.
  • In the second loop, we check the condition that array elements value is greater than 0 and print all array elements.
  • The isDistinct function checks in the array two values are not the same. if the values are the same it will return false value because this function is the boolean type that returns an only boolean value.
6 0
3 years ago
Is there SUM in Small basic? ​
babunello [35]

Answer:

no

Explanation:

3 0
3 years ago
As our use of the internet increases e-safety becomes essential.<br> Discuss why e-safety is needed.
nlexa [21]

Answer:

The answer is described below

Explanation:

E safety means means protection of private information and personal safety when using the internet. E safety involve the protection of private information, passwords against identity theft or property theft. A persons  private information, passwords can be gotten through the use of phishing or malwares.

Also, the use of internet has exposed people to cyber bullying(i.e abuse of an individual), stalking, engaging underage children into sexual relationships and sextortion.

E safety  help protect children from harmful content and services as those listed.

8 0
3 years ago
i need big help so everyday my computer add new tabs when im working and what i do is check for viruses and watch vidoes how to
Sladkaya [172]

Since your computer add new tabs when you are working and the thing to do are:

  • You may manually scan for malware as well.
  • Launch Chrome.
  • Click More. Settings in the top right corner.
  • After clicking Advanced Reset, tidy up. tidy up the PC.
  • Choose Find.
  • Click Delete if you are prompted to remove undesirable software. Your computer might need to be restarted.
<h3>Why do my computer's tabs keep growing?</h3>

The chance exists that some form of malware has been installed on your computer, and this is what is causing the tabs to open randomly. Corrupt Installation: It's also possible that this problem is being brought on by a corrupt Chrome browser installation.

To access the Chrome Settings menu, enter chrome:/settings and press Enter. In the Extensions tab, locate New Tab.

One can still solve the problem by: To access the Chrome Settings menu, enter chrome:/settings into the address bar of Chrome and hit Enter. Click on the trash can icon on the "Extensions" tab of the Chrome Settings menu.

Please look for any further dubious extensions that you do not use or are unsure of their origin and remove them as well.

Learn more about Malware attack from

brainly.com/question/17311729
#SPJ1

5 0
1 year ago
Other questions:
  • 14. Which commercial RDBMS product was the first to hit the market and is the biggest?
    15·1 answer
  • A company wishes to move all of its services and applications to a cloud provider but wants to maintain full control of the depl
    7·1 answer
  • The following program includes fictional sets of the top 10 male and female baby names for the current year. Write a program tha
    15·1 answer
  • You put $500 in an interest bearing bank account that pays 2% per year but has a fee of $2 per month. Are you getting ahead?
    14·2 answers
  • Which software would you use to create a print design?
    8·2 answers
  • What is electrical induction?​
    11·2 answers
  • Why has the PCM sampling time beenset at 125 microseconds?
    11·1 answer
  • Question # 6
    11·2 answers
  • The Freeze Panes feature would be most helpful for which situation?
    6·1 answer
  • Why is it important to prevent financial loss
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!