1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ch4aika [34]
3 years ago
11

In which method of encryption is a single encryption key sent to the receiver so both sender and receiver share the same key?

Computers and Technology
1 answer:
mars1129 [50]3 years ago
7 0

Answer:

B. Symmetric key encryption

Explanation:

Symmetric key encryption is one in which a single encryption key is sent to the receiver so both sender and receiver share the same key. In this type of encryption, the sender uses a particular key to encrypt the data and sends the encrypted data (cipher data) to the receiver and then the receiver uses the same key to decrypt the data.

Public key encryption, or asymmetric encryption uses two keys - a private key and a public key. The public key is know to everyone while the private key is known only to those for whom the message is intended. An application of this type of encryption is in SSL (Secure Sockets Layer) -  a protocol for transmitting data privately on the internet.

Private key encryption is not exactly one of the encryption methods but rather, a private key and a public key are used in encryption.

The best option is therefore <em>symmetric key encryption</em>.

<em>Hope this helps!</em>

You might be interested in
Sarah has to add a picture from her computer file and add a caption to it. Arrange the steps in a correct sequence.
MatroZZZ [7]

Answer:

-Click insert

-Click picture

-Click from file

-Right click the picture

-Select the desired picture and again click Insert

-Click insert caption

-Write the caption and add it

Explanation:

6 0
3 years ago
Which design principle is the subject of a photo or image? ​
VashaNatasha [74]

The focal point is where the eye is drawn to in a photo or image.

6 0
3 years ago
If we were to replicate Dr. Stanley Milgram's obedience study today, do you think the results would be different?
Montano1993 [528]

Answer:

Explanation:

The results would be exactly the same. We have learned little about authority and when to oppose it.

I'll give you an example. Last night I was in a restaurant like Taco Bell or Subway. Across from me was a girl with an ordinary backpack which was all I could see. It was quite common to see that in the University District where I was. I paid no attention until two policemen came in (both over 200 pounds -- she was tall but could not have been more than 130) and began arrest procedures. She started shouting very foul language but otherwise did not resist. They put handcuffs on her wrists which were behind her back. Again she she  used profane language only screaming that they were hurting her. It took the one police officers a moment to find his key and loosen the cuffs, which he did, but she was still uncomfortable and cursing.  

She was silent as they took her out. Nobody questioned the incident at all. Do you think Dr. Millgram would recognize this as an example of his theory? I'm sure he would. Trust me, this was not staged. There was a 3rd officer who drove the girl and one of the 2 arresting officers away.

7 0
3 years ago
Al these are benefits of computer literacy except
Harrizon [31]

Explanation:

  • Being computer literate supports entrepreneurship. ...
  • Communication. ...
  • Enhance your employment opportunities. ...
  • Address the gap in your knowledge. ...
  • Computers Reconstruct Business
8 0
3 years ago
+20 POINTS!!!~~~~~When adding delegates to his mailbox, which role should Joel use if he would like the user to be able to read
DochEvi [55]

Answer:

b on edge

Explanation:

4 0
3 years ago
Other questions:
  • Plane eyes I don't know
    9·1 answer
  • What answer best explains why improper netiquette is considered dangerous? Individuals who violate user policies are often charg
    14·2 answers
  • What are expansion cards used for?​
    9·2 answers
  • Please help quickly!!! which of the following is not a peripheral?
    8·2 answers
  • Which statement describes one drive?
    6·1 answer
  • 1. provide at least 3 properties and 3 methods of the object computer.
    8·1 answer
  • 1. What are you going to do if someone ask for your personal information online?​
    12·2 answers
  • One of the disadvantages of cable technology is that: while it works well for television signals, it is ineffective for data tra
    8·1 answer
  • Describe risk avoidance. Name three common methods of risk avoidance.
    5·1 answer
  • The economic importance of computer viruses​
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!