1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Semenov [28]
3 years ago
12

In symmetric key cryptosystem, assume that Alice and Bob have set up a common key Kab. This key is only known to Alice and Bob.

(1a) Can we achieve data origin authentication?
Computers and Technology
1 answer:
azamat3 years ago
4 0

Answer:

yes

Explanation:

If it is guranteed the key is only known to Alice and Bob and there is no risk of man in the middle attack or channel spoofing so we can achieve data origin authentication

You might be interested in
Calculate the wait time and turnaround time for FCFS, shortest remaining time, and round-robin by drawing a diagram or chart. As
lidiya [134]

Answer:

id id d

Explanation:

4 0
3 years ago
Read 2 more answers
Create your own array of strings. Call the array anything you like as long as it is a valid variable name. The list should conta
Finger [1]

Answer:

alphabets = "ABCDEFGHIJKLMNOPQRSTUVWXYZ"

newList = []

N = 3

for i in range(N):

   newList.append(alphabets[i] * 3)

print(newList)

Explanation:

  • Initialize the alphabets.
  • Use a for loop to append three alphabets to new list.
  • Finally print the new list.
5 0
3 years ago
A bot can use a _______to capture keystrokes on the infected machine to retrieve sensitive information.
fgiga [73]

Answer:

keylogger.

Explanation:

A keylogger can be defined as a software program or hardware device designed for monitoring and recording the keystrokes entered by an end user through the keyboard of a computer system or mobile device.

Basically, a keylogger can be installed as a software application or plugged into the USB port of a computer system, so as to illegally keep a record of all the inputs or keys pressed on a keyboard by an end user.

In order to prevent cyber hackers from gaining access to your keystrokes, you should install an anti-malware software application such as Avira, McAfee, Avast, Bitdefender, Kaspersky, etc.

An antivirus utility is a software application or program that's used to scan, detect, remove and prevent computer viruses such as Malware, Trojan horses, keyloggers, botnets, adwares etc.

In conclusion, a bot can use a keylogger to capture keystrokes on the infected machine to retrieve sensitive information.

3 0
3 years ago
Making a class's instance variables public and its methods private and accessing those instance variables only through the class
Burka [1]

Answer:

False

Explanation:

The reason is that it should be the opposite. The class's instance variables should be private, and its methods should be private. In that way, only these methods can access to the private variables. For example, you have a class named Person and a variable called <em>ssn</em> (social security number). It is better to make this <em>ssn</em> variable <u>private (</u>It is actually a private information for a person<u>)</u> so that it cannot be read or modified outside of your class.

3 0
3 years ago
Which object exerts more gravitational force, object A with a mass of 25 grams and a density of 2 g/cm3 or object B with a mass
qwelly [4]
More gravitational force is exerted on object B since it has higher mass. Force and mass are directly proportional so when mass is higher then the force is larger. However, when the mass is small, then the force is well small. From the statement above, object A has a mass of 25 grams which is smaller with object B with a mass of 50 grams.
6 0
3 years ago
Other questions:
  • Which mechanism transmits rotary motion to reciprocating?
    7·1 answer
  • 7. Glaciers have two types of deposition. Define them below:
    6·1 answer
  • _____ is a school-to-work program that provides the student with paid employment, school credit, and grades while participating.
    14·2 answers
  • Normal wear and road conditions can take their toll on a car’s steering and suspension system, altering __________. A. wheel ali
    15·2 answers
  • What is the difference between word processing software and email?
    12·2 answers
  • Describe the difference between a myth and a fable.
    12·1 answer
  • The force required to slide an object is equal to _____.
    13·1 answer
  • In which drawer can you set certain lights to light up on your micro:bit?
    12·2 answers
  • What are your two biggest strengths as a student? How will these strengths help you become a self-directed learner?
    13·2 answers
  • How do you mark the brainiest?
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!