1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
yulyashka [42]
4 years ago
13

The best way to achieve stronger encryption is to

Computers and Technology
1 answer:
AnnyKZ [126]4 years ago
4 0

Answer:

Use the NIST standards!

Explanation:

- A larger key size helps, but it depends what the underlying algorithm is, so this is not in itself a solution.

- Some block ciphers are not strong.

- Hardware acceleration will only produce a result faster, not increase the strength of the encryption.

You might be interested in
Which is the best method of marketing a game to casual players?
Phoenix [80]
A casual game is a video game targeted at or used by casual gamers. Casual games may exhibit any type of gameplay or genre. They are typically distinguished by simple rules and by reduced demands on time and learned skill, in contrast to more complex hardcore games. They typically impose low production and distribution costs on the producer. Casual games are often played on a personal computer online in web browsers, but are also popular on game consoles and mobile phones.

Hope this helped. Have a great day! :D
3 0
4 years ago
Read 2 more answers
In your opinion, why did Proponents<br>of IPs used IPV6 instead of IPv5​
frutty [35]

Answer:

The following where many reasons why IPv6 was used instead of IPv5 which are the limitation of it's 32 bit address, IPv5 began or used with a different name called Internet streaming, IPv6 provides unlimited addressing, because it comprises of 128 bit.

Explanation:

Solution:

The following reasons why Proponents  of IPs used IPV6 instead of IPv5​ is stated as follows:

  • Due to its limited 32 bit addressing
  • IPv6 offers almost unlimited addressing because of its 128-bit addressing
  • IPv5 started under a different name which is internet stream(ST)
  • ST(Internet streaming) was developed for streaming video and voice
  • ST was developed by Apple, NeXT, and Sun Microsystems
  • ST was effective on specific frequency to carry out communication
5 0
3 years ago
A bag of cookies holds 40 cookies. The calorie information on the bag claims that there are 10 servings in the bag and that a se
laila [671]

Answer:

import java.util.Scanner;

public class ANot {

   public static void main(String[] args) {

   Scanner in = new Scanner (System.in);

       System.out.println("How many cookies did you eat today");

       int numOfCookies = in.nextInt();

       double numCalories = (numOfCookies*300)/4;

       System.out.println("The total number of calories you consumed in "+numOfCookies+" cookies is " +

               " "+numCalories);

   }

}

Explanation:

This code is implemented in Java.

  1. We know from the question that 4 cookies contain 300 calories
  2. Therefore number of calories consumed = (number of cookies eaten*300)/4
  3. To implement this in java we used the scanner class to prompt user for the input
  4. save the input to a variable and write mathematical expression for the number of calories consumed
  5. Then output the result

4 0
3 years ago
If you have two pennies, the probability of both coming up heads when flipped
aleksandrvk [35]
50% is the answer to your question
5 0
3 years ago
Read 2 more answers
CRM software programs are designed to help companies gather all customer contact information into multiple data management progr
kogti [31]

Answer:

The correct answer is: CRM are often implemented into sales departments first since this area of a company typically generates the greatest amount of customer contact.

Explanation:

To begin with, a Customer Relationship Management or CRM is a management system used in the field of marketing and business in order to create a better relationship with the customers of a company under the creation of a system that uses all of the clients' personal data to achieve the goal of understanding them their likes and dislikes in order to get to known them better and generate a strong bond with them.

To continue, this system is typically used in the sales departments due to the fact that this area of the company is the one<u> that has more contact with the clients</u> at first sight. However, the system could be use in every department of the organization as well.

6 0
4 years ago
Other questions:
  • Maria wants to create a simple logo for her new flower shop. She would like to use the computer to create this logo. Maria shoul
    13·2 answers
  • Why is it a good idea to save work in the cloud
    10·2 answers
  • True false) cad means computer aided manufacturing​
    10·1 answer
  • What is the purpose of indexing?
    15·2 answers
  • Which is a concept of the CIA of Computer Security
    7·1 answer
  • Create the HTML code for this
    14·1 answer
  • 1
    10·1 answer
  • Can u guys report me as much as u can I’m trying to delete this account
    7·1 answer
  • Which tab do you open to access the Comments feature?
    11·1 answer
  • (isc)² certified information systems security professional official study guide 6th editionauthors: stewart, james michael; chap
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!