1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
user100 [1]
3 years ago
5

For messages sent through an insecure channel, a properly implemented digital signature gives the receiver reason to believe the

message was sent by the claimed sender. While using a digital signature, the message digest is encrypted with which key?
Computers and Technology
1 answer:
stealth61 [152]3 years ago
6 0

Answer: the sender's private key.

Explanation:

For messages sent through an insecure channel, a properly implemented digital signature gives the receiver reason to believe the message was sent by the claimed sender. While using a digital signature, the message digest is encrypted with the sender's private key. When the message is being sent through the sender computes a hash function of the message and encrypts it with the sender's private key . When the message reaches its intended recipient it is decrypted and  the hash function is recomputed and compared to the digital signature to establish authenticity of the message and maintain its integrity.

You might be interested in
What type of media is a hard disk​
anyanavicka [17]

Answer:

A hard disk provides a high-capacity alternative to magnetic storage media. It contains metal platters coated with a magnetic layer. The platters usually spin continuously when a computer is on, storing data in different sectors on the magnetic disk.

Explanation:

5 0
3 years ago
Which cpu type would most likely be found in a smartphone?.
dlinn [17]

Answer:

dual-core (two), quad-core (four) and octa-core (eight)

Explanation:

These are the most common according to my research.

If I helped you, can I please have brainliest?

Have a great day/night!

4 0
3 years ago
Display all the natural numbers from 1 to 100 that are exactly divisible by 3 and 7 using FOR … NEXT. Without using Mod
Tcecarenko [31]

Answer:

FOR i% = 1 TO 100

 IF ((i%\3) = i%/3) AND ((i%\7) = i%/7)  THEN

   PRINT i%

 END IF

NEXT i%

Explanation:

Of course using MOD would be cleaner, but another way to check if a number is integer divisable is to compare the outcome of an integer division to the outcome of a floating-point division. If they are equal, the division is an integer division.

The program outputs:

21

42

63

84

6 0
3 years ago
When a security professional is presented with a contract drawn up by a company's legal department, which allows them to "hack"
kumpel [21]

<em>The answer is : He must consult with a lawyer. </em>

<em>Hacking is considered illegal and in other countries, it is punishable by law. Hacking is gaining unauthorized access to a network. Even when someone is giving you permission to do it, it is still wrong and illegal. Therefore, you must know of your rights and make all the party involved to signed an agreement to save yourself.</em>

8 0
4 years ago
Within the sites that support disaster recovery, __________ is a separate facility that does not have any computer equipment but
inna [77]

Question:

Within the sites that support disaster recovery, __________ is a separate facility that does not have any computer equipment but is a place where employees can move after a disaster.

A) disaster site

B) hot site

C) warm site

D) cold site

Answer:

The correct answer is answer is D)                  

Explanation:

A cold site is a business location that is utilised as a  backup in the event of a disruptive operational disaster at the normal business site. A cold site is an office, but it does not always have the necessary equipment to resume prompt operations. The business paying for the cold site, provides and installs this equipment.

Cheers!

6 0
4 years ago
Other questions:
  • What do i study to become a network engineer?
    11·1 answer
  • At age 16 Cheyanne just got her drivers license
    5·2 answers
  • During a night flight, you observe a steady red light and a flashing red light ahead and at the same altitude. What is the gener
    11·1 answer
  • Which character goes at the end of a line of code that starts with if?
    8·1 answer
  • HELP ME!! <br> it’s a cross word, but I don’t know the answers, 25 points
    12·1 answer
  • For some reason, Danica's classmate George could not find the registered symbol in the symbol gallery. He is selling
    14·1 answer
  • A system analyst generally needs to have a number of skills. For example, technical and analytical skills are required for this
    7·1 answer
  • Employers are looking for an employee?<br>​
    9·1 answer
  • You can resize a row in a table by dragging the ____.
    13·1 answer
  • 1. Keisha is in her first semester of college and is taking 10 credit hours: ACA 122, CIS 110, PSY 150, and developmental math.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!