1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Cloud [144]
3 years ago
12

Alice posts a key for encrypting that anyone can access. Bob uses that key to encrypt a message, then sends it to Alice. When Al

ice receives the message, she decrypts it using a private key.What kind of encryption process is this
Computers and Technology
1 answer:
UNO [17]3 years ago
5 0

Answer:

Public key encryption

Explanation:

DescriptionPublic-key cryptography, or asymmetric cryptography, is a cryptographic system that uses pairs of keys: public keys which may be disseminated widely, and private keys which are known only to the owner.

You might be interested in
In theory, a hacker with a small but powerful directional antenna could access a wireless network from more than one mile away.
Svetradugi [14.3K]
100 miles i assume since the avarge antanna cover 5-50 miles
3 0
3 years ago
Whixh options are available when a user modifies a recurring appointment. Check all that apply
Leno4ka [110]

Sorry I don’t know the answer I am really sorry
7 0
3 years ago
Application means to
lakkis [162]
An application or an app is a type of software that allows us to perform specific task . When you opens an application it runs inside your operating system . If more than one application are opened in one time it is known as multitasking  
Applications of desktop or laptop are called desktop applications while mobile applications are called mobile apps
3 0
3 years ago
What is virtual reality?
Burka [1]
The computer-generated simulation of a three-dimensional image or environment that can be interacted with in a seemingly real or physical way by a person using special electronic equipment, such as a helmet with a screen inside or gloves fitted with sensors.
4 0
4 years ago
Which option identifies what the computer will yield in the following scenario?
dolphi86 [110]
I think it would be the computer program will create a design with the exact dimensions
6 0
2 years ago
Other questions:
  • Todd, a travel agent, lost his job due to no need for his skill. This is an example of what type of unemployment?
    12·1 answer
  • Which fingers do you use to type the following letters rtgvf
    11·1 answer
  • Which relationship is possible when two tables share the same primary key? one-to-one one-to-many many-to-one many-to-many
    15·2 answers
  • Using computer software, compare the 2016 year-to-date sales through February to the 2017 year-to-date sales through February fo
    15·1 answer
  • What adds the element carbon to the environment
    10·2 answers
  • What is the duty of business to contribute to the well-being of society
    12·1 answer
  • A retail company must file a monthly sales tax report listing the total sales for the month and the amount of state and county s
    11·1 answer
  • What do level meters show?
    8·1 answer
  • I need a utube name for a gaming channel....PLEASE HELP...BRAINLIEST
    5·1 answer
  • Why can't this app have people ask riddles.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!