1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sleet_krkn [62]
3 years ago
14

What are the two types of primary safeguarding methods

Computers and Technology
1 answer:
hjlf3 years ago
8 0

Answer:

Guards and devices

Explanation:

You might be interested in
If David wishes to digitally sign the message that he is sending Mike, what key would he use to create the digital signature
Goshia [24]

The key would he use to create the digital signature is Mike public key.

<h3>Which key is used to sign messages?</h3>

Digital signatures are known to be used via public key. Here, the person is said to be one who is said to produce or creates the digital signature that  uses a private key to encrypt signature-linked data.

The only way to decrypt a data is only with the signer's public key, the key David would use to create the digital signature is Mike public key.

Learn more about  public key from

brainly.com/question/17486027

7 0
2 years ago
Siva added a Contact Form to her website. This is used for the collection to be included in
MAVERICK [17]
This helps people to ask questions or report if something wrong happens but yeah it can be included in the profile collection.hope this helps.
4 0
4 years ago
Which new jobs will be in demand in the next 20 years
s2008m [1.1K]
The answer is Data Jobs, Data Analysis, Solution Architecture, Software Engineering and Product Managers, there is many more but there's just a few. Hope I helped! :)
3 0
3 years ago
Anyone got the edmentum computer programming post test answers?
Arturiano [62]

Answer:

yessir

Explanation:

7 0
4 years ago
If you commit license fraud by using an altered or unlawful license:
Scorpion4ik [409]
<h2>Answer:</h2>

All of these

<h2>Explanation:</h2>

If someone is caught with a fake or altered or unlawful driving license, the law will come in action and the person can be sent to jail for it. He may be fined for an amount depending upon the state law. His driving privilege can also be suspended automatically in some states and the false license will be confiscated so that no one could be able to use it again in any circumstances.

5 0
3 years ago
Read 2 more answers
Other questions:
  • A/An is a series of instructions or commands that a computer follows; used to create software
    10·2 answers
  • Your bank contacts you asking you to phone a number supplied in the email.What do you?
    13·2 answers
  • Explain the difference between an Internet draft and a proposed standard
    11·2 answers
  • Write the definition of the word "log" as it would be used in relation to digital literacy
    13·1 answer
  • How can you prevent your VMs receiving DHCP server messages from unauthorized virtual machine pretending to be DHCP servers?
    13·1 answer
  • Seven Features of computer aids design software
    6·1 answer
  • Write a short assembly language program in either our 8088 SCO DOSBox or 80386+ MASM Visual Studio 2017 environment that demonst
    11·1 answer
  • It is a field that contains a unique identifier for each record in a primary table
    5·1 answer
  • Debevec mentions using the technology he described to animate entire human bodies. Discuss why you think this is or is not a goo
    13·1 answer
  • All of the data in a digital book (letters, punctuation, spaces, etc) are stored and processed in a computer as binary. Break do
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!