1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Cloud [144]
4 years ago
12

Alice posts a key for encrypting that anyone can access. Bob uses that key to encrypt a message, then sends it to Alice. When Al

ice receives the message, she decrypts it using a private key.What kind of encryption process is this
Computers and Technology
1 answer:
UNO [17]4 years ago
5 0

Answer:

Public key encryption

Explanation:

DescriptionPublic-key cryptography, or asymmetric cryptography, is a cryptographic system that uses pairs of keys: public keys which may be disseminated widely, and private keys which are known only to the owner.

You might be interested in
TP is commonly used to __________ and __________ files to a server.
Goshia [24]

Answer:

upload; download

Explanation:

This question is not complete: is not TP

Is FTP is an Internet protocol commonly used to upload and download files to a server, For example:

There are image banks where you can sell or share files like videos, music, and photographs, in this kind of website, you can transfer files for FTP, in FTP we must type a user name and password to send the files.

8 0
3 years ago
In a nested repetition structure, one loop, referred to as the ____ loop, is placed entirely within another loop, called the ___
Alja [10]

Answer:

Inner, outer

Explanation:

Bruh. Its logic

3 0
3 years ago
1. Choose in each case that it affects which of the Information security requirements (confidentiality, integrity, availability)
just olya [345]

The  cases that it affects which of the Information security requirements is explained below.

<h3>What are the Information security violations of the above cases?</h3>

Someone has copied your credit card and CVV number has violated the confidentiality as this is to be known only by the owner for if the cvv is known by another person who is not the owner, it may lead to theft of the owners' funds/money.

If someone sends a message “Please come at 10 AM”, the receiver receives “Please come at 10.” and the person did miss the appointment due to the misinformation, it violates the availability. If one is not understanding a message, it is better to clarify so as to know if one will be available,

If the attacker has deleted the installed copy of the Microsoft Office application from your laptop is integrity/confidentiality. One who has integrity will not attack another's' system.

learn more about confidentiality from

brainly.com/question/863709

6 0
3 years ago
What structures in which lighting heating and other systems are controlled by computers
Ilia_Sergeevich [38]

Museum !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!

8 0
3 years ago
In the context of intentional security threats, _____ can erase data and wreak havoc on computers and networks but do not replic
mihalych1998 [28]

Answer:

The answer is "Option D".

Explanation:

Trojan program is a malicious code that is also known as a virus. It is a rootkit, that aims to infect the computer to hide or obscure an object. These programs are mainly used to download additional content, such as additional pieces of malware, to the infected computer, and other options are wrong that can be defined as follows:

  • In option A, It is not correct, this option infects the system.
  • In option B, It is used for infects another computer that's why it is incorrect.
  • In option C, It is incorrect because it is used in cybersecurity.  
5 0
3 years ago
Other questions:
  • A custom date format set for a date/time field that contains the symbols mmm/dd/yy would display the date as ____.
    12·1 answer
  • What is a propriety database
    10·1 answer
  • 2. Does the government have the right to tell you what religion you should follow? Why or why not?
    9·2 answers
  • You have just made changes to a GPO that you want to take effect as soon as possible on several user and computer accounts in th
    7·1 answer
  • Help me out here pleaseeeee
    9·2 answers
  • How to build a communication network
    13·1 answer
  • What is a computer network that provides connectivity in a geographic area or region larger than that covered by a local area ne
    7·1 answer
  • You are the administrator for a small company. You need to create a new group for users in the sales department. You need to nam
    14·1 answer
  • What happens when in Word 2016 when the home ribbon tab is clicked on?
    13·1 answer
  • Under the fair use doctrine, which group of people are allowed to use certain
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!