1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Arturiano [62]
3 years ago
15

Shovels and Shingles is a small construction company consisting of 12 computers that have Internet access. The company's biggest

concern is that a wily competitor will send e-mail messages pretending to be from Shovels and Shingles in order to get confidential information. Write down an encryption solution that best prevents a competitor from receiving confidential information and justify the recommendation.
Computers and Technology
1 answer:
Y_Kistochka [10]3 years ago
3 0

Answer:

The Encryption solution that best prevents a competitor from receiving confidential information is the SSL(secure Socket Layer) Or TLS(Transport Layer Security).

Explanation:

Solution:

From my own perspective the encryption solution that i will use that prevents s a competitor from receiving confidential information and justify the recommendation is the SSL(secure Socket Layer) Or TLS(Transport Layer Security).

This is because in this case we have to share data confidentially (information need to be hidden from Unauthorized  security access. also these provides the Transport Layer security that we needed in above example above.

The purpose of these protocol is to provide server and client authentication, Data confidentiality,and Data integrity (protected from unauthorized change). Application Layer client/server program such as HTTP that uses the service of TCP can encapsulate their data in SSL Packets.

SSL (Secure Socket Layer): is defined as the normal technology for protecting an internet connection secure and defend any sensitive data that is being sent between two systems, and not allowing criminals from reading and changing any information sent, including potential personal details.

TLS (Transport Layer security): It is a procedure that allows  data integrity  and privacy over Internet communications.

You might be interested in
A popular Voice over Internet Protocol (VoIP) service is ________.
Aloiza [94]
The answer would be Skype
8 0
3 years ago
Why did Herman Hollerith invent the Tabulating Machine?
Anvisha [2.4K]

Answer:

the machine was developed to help process data for the 1890 U.S. Census.

Explanation:

U.U

8 0
3 years ago
Universal Containers sells its products online using a system built on Force Sites. The orders are captured and processed in Sal
sveta [45]

Answer:

Use Outbound Messages to send customer data from Salesforce to the marketing system.

Use a middleware tool to pull customer data from Salesforce and push it to the marketing system on a daily basis

Use Apex callout to send customer data from Salesforce to the marketing system

Explanation:

The above points illustrates a mechanism for moving cutomer data to the marketing system efficiently.

3 0
4 years ago
Design and implement an application that reads a string from the user then determines and prints how many of eachlowercase vowel
frez [133]
Design and implement an application that reads a string from the user, then determines and prints how many of each lowercase vowel (a, e, i, o, and u) appear in the entire string . Have a separate counter for each vowel. Also count and print the number of nonvowel characters .

SPECIFICATION OF PROMPTS, LABELS AND OUTPUT : Your code should use the prompt "enter string : ". After the input is read, there are six lines of output , each starting with a different label: "a: ", "e: ", "i: ", "o: ", "u: ", "other: " in that order. After each label is the required count.

For example: if "aardvark heebie jeebies" were read in,
4 0
3 years ago
U GET BRAINLIEST HELP PLZ
Art [367]
BOTH OF THEM ARE C : )
3 0
3 years ago
Other questions:
  • Which of the following are stages in the computer life cycle? Check all of the boxes that apply.
    13·2 answers
  • How to change the date modified on a word document?
    11·1 answer
  • You have a small company and want to keep your cost low, but it is important your employees share data. which network would prov
    13·1 answer
  • What is the problem with the code snippet below? public class Test { public static void main(String[] args) { System.out.println
    6·1 answer
  • Analyze the following code.
    10·1 answer
  • What is the full form of RAM. ​
    5·2 answers
  • What type of data uses numbers that can be used in the arithmetic operations?
    14·1 answer
  • Which image-editing tool can be used to help remove spots and other marks from an image?
    13·1 answer
  • Write a line of code that declares a variable called shipName and set it equal to the string SpaceX3000.
    9·1 answer
  • Create a defined name for range b6:e6 using walkup as the range name
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!