1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Goshia [24]
3 years ago
12

A digital certificate confirms that the macro created by the signer has not been altered since the digital certificate was creat

edA. TrueB. False
Computers and Technology
1 answer:
Nesterboy [21]3 years ago
3 0

Answer: False

Explanation:

Digital certificate is defined as entity identification in digital form that is used by a user or firms to share their information along with authentication and security. It uses public key cryptographic technique and so it is also know as public key certificate.

  • Digital signature is the signature that is done digitally to secure data or document.It maintains security of the content present  in message of information that is being exchanged through e-signature.It follows encryption technique for maintaining authenticity.
  • Therefore, digital signature is the signing feature that protects macro after being made to maintain its authenticity.
  • Thus, the given statement is false.
You might be interested in
Micro sleep is when you ____.
Levart [38]

Microsleep refers to periods of sleep that last from a few to several seconds.

8 0
3 years ago
Read 2 more answers
To delete a database object, right-click the object in the Navigation Pane and then click ____ on the shortcut menu.
Reil [10]
Click DELETE on the Shortcut Menu. Be sure that the object you are deleting is closed before because it will not let you delete.
3 0
4 years ago
A computer which links several pcs together in a network is called
Nadusha1986 [10]
Is it called a, "server".
8 0
4 years ago
6. The following is a dump of a DATA chunk in hexadecimal format. 00000015 00000005 0003000A 00000000 48656C6C 6F000000 a. Is th
ryzh [129]

Answer:

Explanation:

a) taking 00000005, it is a 13th bit which is 0, and therefore, we'd call it an ordered chunk

b) taking 00000005 again, it is 14th (B) and 15th (E) bits are 0 and so we'd call it a middle fragment

c) 00000015 is equal to 21, it is not a multiple of 4, and as such, it needs 3 padding bytes

d) 00000005 is equal to 5 making it a TSN. So the TSN is 5

e) taking 0003, we can then say the SI is 3

f) taking 000A, the SSN is then 10

g) the message is 48656C6C

6 0
3 years ago
What is imagined risk
lara31 [8.8K]
Hello there!

Imagined Risks are simply 'imaginary' risks that are created out of doubt/fear.

Hope This Helps You!
Good Luck :)
3 0
4 years ago
Other questions:
  • A simple operating system supports only a single directory but allows it to have arbitrarily many files with arbitrarily long fi
    13·1 answer
  • Egyptian hieroglyphs were part of a writing system used by the ancient Egyptians. What type of graphic design elements did they
    13·1 answer
  • Your boss is very skeptical about the idea of storing his files up in the cloud rather
    8·1 answer
  • PLZ HELP ME ITS URGENT PlZ PLZ PLZ
    11·1 answer
  • Sequential codes may be used to represent complex items or events involving two or more pieces of related data.
    7·1 answer
  • HELP ASAP!!!
    7·1 answer
  • What is the output?
    13·1 answer
  • What is the purpose of file extensions? A. They execute the mail merge function, B. They tell the operating system what kind of
    15·2 answers
  • HELP ASAP Encoding a video format and then decoding it during playback is one of the functions of MPEG-4 and H.264 file players.
    10·2 answers
  • PLZZZZZ help will give brainleist <br> Two common sound files are?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!