1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
dusya [7]
4 years ago
8

Provide a few examples of how cryptography actually secures data.

Computers and Technology
1 answer:
Anestetic [448]4 years ago
4 0

Answer:

Symmetric, asymmetric and one-way hash cryptography.

Explanation:

Cryptography is a way of protecting data information and communication, using encryption keys and is only decrypted when it gets to the intended receiver.

There are three ways of which cryptography can be used to protect data. They are;

1. Symmetric cryptography

2. Asymmetric cryptography

3. One-way hash cryptography

Symmetric cryptography requires for one key to be used to encrypt and decrypt information. Asymmetric cryptography requires two keys, private and public keys that are mathematically related to encrypt and decrypt information. Both must be used together to encrypt and decrypt data.

One way hash uses an algorithm to convert a random length data to a fixed length encrypted data.

You might be interested in
"ikev2 requires the use of which of authentication protocol?"
katen-ka-za [31]
Ikev2 requires the use of authentication protocol called Extensible Authentication Protocol (EAP).  It is <span>is a protocol for wireless networks that ampiflies on the authentication methods for the Point-to-Point Protocol (PPP).</span>
4 0
3 years ago
Which of the following methods is the easiest way to set up a VPN client on a computer for a user who is not technical?
Pie

Answer:

Option D.

Use CMAK to create an executable to install.

Explanation:

The CMAK is the Connection Manager Administration Kit it is a feature in Microsoft Windows that allows users to customize the remote connection experience for users on their network.

The CMAK can be simply used by the technical expert to remotely operate the client computer, and customize the VPN himself without the non-technical user having to do anything. This can be done for computers only on a network however.

3 0
3 years ago
Marta, an art director, wants to give feedback to her graphic designer on his logo design. To be effective her feedback should b
Lana71 [14]

Answer:

B. Specific and provided during the construction of the project, and the end of the project.

Explanation:

The feedback have to be specific and provided during the construction of the project, and at the end of the project.

8 0
3 years ago
Read 2 more answers
Which of the following are picture adjustments that can be made to images?
Masteriza [31]

Answer:

D - All of the above

Explanation:

8 0
3 years ago
Read 2 more answers
Can anybody explain to me why it says i have a message,but when i go to my inbox it's empty??
Zanzabum

Answer:

sameee ion know why tbh

Explanation:

4 0
3 years ago
Read 2 more answers
Other questions:
  • Who are some of my emails not all deleting on my android i have to use my laptop to see them to delete them?
    12·2 answers
  • What is used to determine when the communications channels are clear and when a device is free to transmit data
    6·1 answer
  • When creating a password, users tend to use Select one: a. All capital letters b. Passwords that are too long c. Familiar phrase
    9·1 answer
  • Why is this cite so rigged
    10·1 answer
  • Which of the following statements best describes the relative amount of content held by digital libraries vs. the amount held by
    12·1 answer
  • Which IDE component provides keyword highlighting and text auto-completion?
    8·2 answers
  • Who invite computer ?​
    7·2 answers
  • Which tool ia used to create the world wide web?
    15·1 answer
  • What is the most used gaming keyboard in 2022?
    8·1 answer
  • What is a thread? what resources does it share with other threads in the same process?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!