1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Murljashka [212]
2 years ago
12

What is the difference between a key escrow and a recovery agent? (Choose all that apply.)

Computers and Technology
1 answer:
Black_prince [1.1K]2 years ago
8 0

Answer:

A and E

Explanation:

A Key Escrow is necessary when a third-party needs access to encrypted data, such as when there is a court order to decrypt the encrypted data. It involve the law giving the order to decrypt the encrypted data.

A Recovery Agent is a person/entity/role allowed to decrypt a user's data in case of emergency, such as when the original key is lost by the user. It is primarily for helping internal users

You might be interested in
The security administrator for Corp wants to provide wireless access for employees as well as guests. Multiple wireless access p
Artemon [7]
It’s B I took the test
7 0
3 years ago
A(n) ________ variable is declared inside a module and cannot be accessed by statements that are outside the module.
Advocard [28]
Local






----------------------------------------------------
6 0
3 years ago
A tooltip is a _____________ that allows the programmer to create a small popup message that displays when the user places the m
Shalnov [3]
I believe a message
7 0
3 years ago
Read 2 more answers
What is a shell programming? Write a shell program to get the following details from the student: NAME, AGE, USN and GENDER. Out
Leya [2.2K]

Shell programs are computer programs designed to run on the Unix/Linux shell

The shell program where comments are used to explain each line is as follows:

#This gets input for NAME

read NAME  

#This gets input for AGE

read AGE  

#This gets input for USN

read USN

#This gets input for GENDER

read GENDER

#This prints the name

echo "Name: $NAME"

#This prints the age

echo "Age: AGE"

#This prints the usn

echo "USN: USN"

#This prints the gender

echo "GENDER: $GENDER"

#The following if condition determines, if the user is eligible to vote or not

if [ $USN -gt 50 ] then

echo "You are not eligible"

else

echo "You are eligible"

Read more about computer programs at:

brainly.com/question/13795586

3 0
2 years ago
write a function print array to print an array on one line as: 9 8 7 6 5 4 3 2 1 0 write and test a function called bubble sort
Lisa [10]

Function print array to print an array on one line as:

void printArray(int arr[], int n)
{
   int i;
   for (i = 0; i < n; i++)
       printf("%d ", arr[i]);
   printf("\n");
}
void bubbleSort(int arr[], int n)
{
  int i, j;
  for (i = 0; i < n-1; i++)      
      for (j = 0; j < n-i-1; j++)  
          if (arr[j] > arr[j+1])
             swap(&arr[j], &arr[j+1]);
}
void main()
{
   int arr[] = {9, 8, 7, 6, 5, 4, 3, 2, 1, 0};
   int n = sizeof(arr)/sizeof(arr[0]);
   printf("Given array is \n");
   printArray(arr, n);
   bubbleSort(arr, n);
   printf("\nSorted array is \n");

What is array?
An array is a type of data structure used in computer science that contains a set of elements (values and variables), each of which is designated by an array index or key. The simplest type of data structure is indeed a linear array, also known as a one-dimensional array. For instance, an array of ten 32-bit (4-byte) arithmetic operations, to indices 0 through 9, may be stashed as ten words at memory addresses 2000,2004,2008,..., 2036 (in hexadecimal: 0x7D0, 0x7D4, 0x7D8,..., 0x7F4) so that the element with index

To learn more about array
brainly.com/question/24275089
#SPJ4

4 0
1 year ago
Other questions:
  • ________ is digital textual information that can be stored, manipulated, and transmitted by electronic devices.
    7·1 answer
  • The safest action to take if someone claiming to be from your banks calls you to ask for account information is to
    8·2 answers
  • A customer has a new laptop with wireless WAN capabilities; however, the software does not connect to the Internet. What would y
    13·1 answer
  • Full form of SMPT???
    15·1 answer
  • 4.5 Code Practice
    15·1 answer
  • How do assignment article computer security, ethics and privacy?
    15·1 answer
  • A tornado destroyed many
    6·2 answers
  • Help pweaseee!! Lloyd has created a validation script for a data entry form. What property should he use to test for a selected
    10·1 answer
  • Q1) write a brief note on desktop computer.
    13·1 answer
  • Which key must be pressed in addition to clicking on a hyperlink for it to be followed?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!