1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Elenna [48]
3 years ago
8

You need to transmit PII via email and you want to maintain its confidentiality. Which of the following choices is the BEST solu

tion?a. Use hashes.b. Encrypt it before sending.c. Protect it with a digital signature.d. Use RAID.
Computers and Technology
1 answer:
zaharov [31]3 years ago
7 0

Answer:

B. Encrypt

Explanation:

The data, in this case PI will be encrypted from end to end. which means that only the person with the encryption keys is able to read what is in the message. Also the encryption will keep data in motion encrypted during transport.

You might be interested in
You are the IT security administrator for a small corporate network. Samuel Garcia (sgarcia) has been away on vacation and has f
TEA [102]

Answer:

Set the password for user sgarcia to G20oly04.

Explanation:

<u>In the following lab, you have to complete the following tasks</u>:

  • Firstly, type the following command, su -c passwd sgarcia on the command prompt after that you have to click Enter to accomplish that task with an individual command.
  • Then, type 1worm4b8 after that you have to click Enter to login credentials for just the root user.
  • After that, type G20oly04 on command prompt after that again click Enter to allocate the new password to that of the user profile in the sgarcia.
  • Again you have to type G20oly04, then click Enter key to verify the latest sgarcia user login details.

<u>Note</u>:- Would never use the usermod -p instruction for change the password, because that will collect the unencrypted details in the following directory.

5 0
4 years ago
What shoul i get, Airpods or a ps4 cooling fan ???
Fynjy0 [20]

Answer:

Airpods, there is ps5 coming out

Explanation:

3 0
3 years ago
Read 2 more answers
HELP!!!!!!!!!! I'M SOO STUCK ON EXCEL OFFICE FUNDAMENTALS!!!!!! I'LL GIVE BRAINLIEST TO THE FIRST RIGHT ANSWER!!!! PLEASE, I'M B
Vitek1552 [10]

Answer:

Time Sheet And Accounting

5 0
3 years ago
How many different messages can be transmitted in n microseconds using three different signals if one signal requires 1 microsec
SIZIF [17.4K]

Answer:

a_{n} = 2/3 . 2^n + 1/3 . (-1)^n

Explanation:

Let a_{n} represents number of the message that can transmitted in <em>n </em>microsecond using three of different signals.

One signal requires one microsecond for transmittal: a_{n}-1

Another signal requires two microseconds for transmittal: a_{n}-2

The last signal requires two microseconds for transmittal: a_{n}-2

a_{n}= a_{n-1} + a_{n-2} + a_{n-2} = a_{n-1} + 2a_{n-2}, n ≥  2

In 0 microseconds. exactly 1 message can be sent: the empty message.

a_{0}= 1

In 1 microsecond. exactly 1 message can be sent (using the one signal of one  microseconds:

a_{0}= 1

2- Roots Characteristic equation

Let a_{n} = r^2, a_{n-1}=r and a_{n-2}= 1

r^2 = r+2

r^2 - r - 2 =0                 Subtract r+6 from each side

(r - 2)(n+1)=0                  Factorize

r - 2 = 0 or r +1 = 0       Zero product property

r = 2 or r = -1                 Solve each equation

Solution recurrence relation

The solution of the recurrence relation is then of the form a_{1} = a_{1 r^n 1} + a_{2 r^n 2} with r_{1} and r_{2} the roots of the characteristic equation.

a_{n} =a_{1} . 2^n + a_{2}.(-1)"

Initial conditions :

1 = a_{0} = a_{1} + a_{2}

1 = a_{1} = 2a_{1} - a_{2}

Add the previous two equations

2 = 3a_{1}

2/3 = a_{1}

Determine a_{2} from 1 = a_{1} + a_{2} and a_{1} = 2/3

a_{2} = 1 - a_{1} = 1 - 2 / 3 = 1/3

Thus, the solution of recursion relation is a_{n} = 2/3 . 2^n + 1/3 . (-1)^n

6 0
4 years ago
Which computer network component allows data transfers from one computer to another through a telephone line?
coldgirl [10]
A Router transfer data packets from one node to another node in a network.
7 0
3 years ago
Read 2 more answers
Other questions:
  • How many degrees of freedom does any unconstrained object have in 3-D modeling?
    6·1 answer
  • You use this method to determine the number of items stored in an arraylist object.
    12·1 answer
  • A sample containing 4.30 g of O2 gas has an initial volume of 13.0 L. What is the final volume, in liters, when each of the foll
    5·1 answer
  • A website that sells high-end ties notices that its ads are showing up for searches that include "cheap". Because its ties are e
    14·1 answer
  • How can you ensure that your web pages are compliant with a w3c standard?
    9·1 answer
  • A RAID structure ____. is primarily used for security reasons is primarily used to ensure higher data reliability stands for red
    14·1 answer
  • How are gems and precious metals similar?
    6·2 answers
  • PLS HELP I WILL MARK BRAINLIEST
    5·1 answer
  • How could you represent the following binary color in hexadecimal? What is its numerical value? What color is it? How
    13·1 answer
  • In the software development process, which review studies the software design before it is released for coding?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!