1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nana76 [90]
3 years ago
8

If Nancy receives an encrypted message from Matthew, which key does she use to read it? Nancy’s private key Nancy’s public key M

atthew’s private key Matthew’s public key
Computers and Technology
1 answer:
Juliette [100K]3 years ago
7 0

Answer:

Nancy's private key

Explanation:

She's receiving it.  That means Matthew used her public key to encrypt it.  She should decrypt it using her private key.  Watch this video for clarification :)

Watch The Internet: Encryption & Public Keys on the big video site which cannot be named on brainly :p

You might be interested in
I have a singular monitor that is a TV for my computer. Recently, I took apart my computer and put it back together. When I put
makkiz [27]

your tv should have either a controls are or a setting area there is an option for "game mode" that should work with the HDMI.

4 0
3 years ago
If your current directory is /usr/david, the command cd / changes your current directory to
Veseljchak [2.6K]
The command "cd /" changes your current directory to the root directory.
6 0
3 years ago
All of the following are standards that enable programs to receive data from and display data to a variety of mobile and desktop
svp [43]

Answer:

AOL

Explanation:

Some of the standards that enable programs to receive data from and display data to a variety of mobile and desktop devices includes;

I. CSS 3: it is a framework used for providing various styles used in web design.

II. HTML 5: this is a hypertext markup language used for creating web pages or website.

III. Javascript: it is a software framework that allows software components to send and receive data through a database.

IV. Service oriented architecture (SOA): this is an architectural pattern which allows various software application components to provide specific services to other applications through a network.

All of the following standards listed above enable programs to receive data from and display data to a variety of mobile and desktop devices except AOL. AOL is an acronym for American Online and it is typically used for providing internet connection through a dial-up.

3 0
3 years ago
Read 2 more answers
A prime number is a number that is divisible only by itself and 1. Write a program that asks a user for an integer value and the
Rashid [163]

Answer:

The Solution Code is written in Java.

  1. public class Main {
  2.    public static void main(String[] args) {
  3.        System.out.print("Please enter an integer: ");
  4.        Scanner input = new Scanner(System.in);
  5.        int number = input.nextInt();
  6.        System.out.print("Prime numbers less than or equal to " + number + " : ");
  7.        for(int i=2; i <= number; i++){
  8.            if(checkPrime(i)){
  9.                System.out.print(i + " ");
  10.            }
  11.        }
  12.    }
  13.    public static Boolean checkPrime(int num){
  14.        for(int i=2; i < num; i++)
  15.        {
  16.            if(num % i == 0){
  17.                return false;
  18.            }
  19.        }
  20.        return true;
  21.    }
  22. }

Explanation:

Firstly, we create a function to check if a number is prime (Line 18 - 27).

  • This function will take one input value which is an integer, num.
  • To check if the input num is a prime, we can use modulus operator, %, to confirm if the num is divisible by any number starting from 2 to num - 1 (Line 19 - 24).
  • If the num is divisible by any number expect 1 and itself, it should equal to zero and return false to indicate it is not a prime number.
  • If all the num (except 1 and itself) is not divisible, the function will return true (Line 25).

Next, in our main program part (Line 3 - 16)

  • Prompt the user to input a number (Line 5 - 7)
  • Using a for-loop, we can keep calling the checkPrime() function by passing a current number (starting from 2 to input number) as argument (Line 12). The checkPrime() function will run and return true it the current number is prime, return false if it is not prime.
  • If the checkPrime() function return true, it will print the current number before proceed to the iteration of the for-loop to repeat the same check prime procedure (Line 13)
  • At the end all the prime numbers less than or equal to the input number will be printed out in the terminal
8 0
3 years ago
Which of the following is NOT a recommended characteristic for incident objectives?A. Stated in broad terms to allow for flexibi
docker41 [41]

Answer:

A. Stated in broad terms to allow for flexibility.

Explanation:

Incident command are controls or directives needed in production or in an organization. A few characteristics not incident command objectives are, all projects and targets must be measurable and attainable, aii hand on board must function in accordance with the incident commander's authorities, and every finished project must meet company quality standards and deadlines. The incident commander's authorities are fixed for a particular sector and is rigid.

6 0
3 years ago
Other questions:
  • Explain what mistake Miranda made in the following scenario. Situation: Miranda suspects that there may be a problem with the ha
    13·2 answers
  • What are options in the Advanced tab in the Share Workbook dialog box? Check all that apply
    14·2 answers
  • Database administrators must make sure that ________ and ________ techniques and procedures are operating to protect the databas
    6·1 answer
  • Assuming that t is an array and tPtr is a pointer to that array, which expression refers to the address of element 3 of the arra
    7·1 answer
  • Write a program that produces the following output (where the user may enter any positive integer under 10):______
    12·1 answer
  • analyze the ethical issues in the use of information technology in Multinational company (MNC) and support you answer with one e
    15·1 answer
  • In Java: Write a class called Shelf that contains instance data that repre-sents the length, breadth, and capacity of the shelf.
    9·1 answer
  • Which of the following that can be use to access session variables in PHP?
    14·1 answer
  • Which of the following tasks can you perform using a word processor?
    8·1 answer
  • .... . .-.. .-.. --- .-.-.-<br><br><br> TRANSLATE THAT.
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!