1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Arturiano [62]
3 years ago
15

Shovels and Shingles is a small construction company consisting of 12 computers that have Internet access. The company's biggest

concern is that a wily competitor will send e-mail messages pretending to be from Shovels and Shingles in order to get confidential information. Write down an encryption solution that best prevents a competitor from receiving confidential information and justify the recommendation.
Computers and Technology
1 answer:
Y_Kistochka [10]3 years ago
3 0

Answer:

The Encryption solution that best prevents a competitor from receiving confidential information is the SSL(secure Socket Layer) Or TLS(Transport Layer Security).

Explanation:

Solution:

From my own perspective the encryption solution that i will use that prevents s a competitor from receiving confidential information and justify the recommendation is the SSL(secure Socket Layer) Or TLS(Transport Layer Security).

This is because in this case we have to share data confidentially (information need to be hidden from Unauthorized  security access. also these provides the Transport Layer security that we needed in above example above.

The purpose of these protocol is to provide server and client authentication, Data confidentiality,and Data integrity (protected from unauthorized change). Application Layer client/server program such as HTTP that uses the service of TCP can encapsulate their data in SSL Packets.

SSL (Secure Socket Layer): is defined as the normal technology for protecting an internet connection secure and defend any sensitive data that is being sent between two systems, and not allowing criminals from reading and changing any information sent, including potential personal details.

TLS (Transport Layer security): It is a procedure that allows  data integrity  and privacy over Internet communications.

You might be interested in
Which of the following would be a show stopper for the development of an enterprise mobile app? The app demands data throughput
mestny [16]

Answer:

The cost of the app development is far greater than the tangible and intangible projected benefit of the app.

Explanation:

The first option is not correct, as in such cases, the app will be available in other areas. Also in case of a bad market share, it is not clear whether the app business will be profitable or not. And hence this is also not a correct option. However, the third option can be a show stopper, as it suggests the app business is not profitable, and no business or app developer is going to make such an app. And the fourth option is wrong, as some Governments will allow the app usage, and the app can still earn the profit. And hence, the correct option is as mentioned in the Answer section.

6 0
4 years ago
Use of the Internet for e-government has increased. Identify the benefits by checking all of the boxes that apply.
jenyasd209 [6]
It’s A my good guy have a great day
7 0
3 years ago
Your child has broken the RJ-45 port of your laptop by sticking clay into it and there are no wireless networks available in you
sesenic [268]

Answer:

آمل أن يساعد هذا Purchase and use a USB to RJ-45 adapter-yes

fiber_manual_record Enable NIC teaming to increase your bandwidth

Explanation:

67.185.94.80

6 0
3 years ago
What is the fifth-generation wireless broadband technology based on the 802.11ac standard engineered to greatly increase the spe
kirza4 [7]

Answer:

The fifth-generation wireless broadband technology based on the 802.11ac standard is called the

5G.

Explanation:

The 5G is the newest baby in town in the area of wireless broadband technology.  The technology is based on the IEEE 802.11ac standard. 5G operates with a 5Ghz signal and is set to offer out-of-this-world speeds of up to 1 Gb/s.  This implies massive connectivity for everyone and everything.  However, its trial has been fraught with many challenges.  Questions have been raised, especially relating to some health concerns about the technology.  However, many advantages have been ascribed to this wireless technology.  They include more reliability, massive network capacity, increased availability, more uniform user experience, higher performance. and improved efficiency.

4 0
3 years ago
Why do designers of smartphones hide computer processing details from
geniusboy [140]

Answer:

b.you can focus on otherthings

6 0
2 years ago
Read 2 more answers
Other questions:
  • ATM machines respond to request in__________​
    13·1 answer
  • Which of the following statements about the placement of illustrations in documents is true?
    12·1 answer
  • What type of monitoring compares network traffic, activities, transactions, or behavior against a database of known attack patte
    9·1 answer
  • Hi weegy, what is the latest android os?
    9·1 answer
  • Use the _______ command to center worksheets vertically and/or horizontally on a page.
    9·1 answer
  • Write a perl program that reads from a file containing a list of names and then displays that list to a user. The program should
    11·1 answer
  • An online bank wants you to create a program that shows prospective customers how their deposits will grow. Your program should
    13·1 answer
  • Write a python statement that print the number 1000
    6·1 answer
  • Please do in python.Given an array of integers, create a 2-dimensional array where the first element is a distinct value from th
    13·1 answer
  • Explain any two types of board band connection​
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!