1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
dusya [7]
3 years ago
8

Provide a few examples of how cryptography actually secures data.

Computers and Technology
1 answer:
Anestetic [448]3 years ago
4 0

Answer:

Symmetric, asymmetric and one-way hash cryptography.

Explanation:

Cryptography is a way of protecting data information and communication, using encryption keys and is only decrypted when it gets to the intended receiver.

There are three ways of which cryptography can be used to protect data. They are;

1. Symmetric cryptography

2. Asymmetric cryptography

3. One-way hash cryptography

Symmetric cryptography requires for one key to be used to encrypt and decrypt information. Asymmetric cryptography requires two keys, private and public keys that are mathematically related to encrypt and decrypt information. Both must be used together to encrypt and decrypt data.

One way hash uses an algorithm to convert a random length data to a fixed length encrypted data.

You might be interested in
If Scheme were a pure functional language, could it include DISPLAY ? Why or why not?​
VARVARA [1.3K]

Answer:

When Scheme is a pure functional language, it cannot include the function DISPLAY. Since the pure functional languages will return the same value whenever the same expression is evaluated, and the DISPLAY would be the output and thus it cannot be part of the purely functional language. Thus in the pure functional language we can evaluate the expressions with the same arguments and it returns the same value since there is no state to change.

Explanation:

4 0
3 years ago
Why can't we sign up to brainly.com??????????????????
LiRa [457]

Answer:

Explanation:

so why are you doing sign up

8 0
3 years ago
Traditional methods of collecting systems requirements include: a. rapid application development. b. prototyping. c. interviews.
diamong [38]

Answer:

interviews

Explanation:

because the designer gets to directly interact with the customer who knows exactly what they want.

3 0
1 year ago
Which of the following tasks is least effective at preventing a computer virus A. Anti-virus's software up to date
MaRussiya [10]
C is your answer
hope that helps
4 0
3 years ago
Read 2 more answers
What is computer? what are the major function of computer​
Naya [18.7K]

Answer:

A computer is a machine that can be programmed to carry out sequences of arithmetic or logical operations automatically. Modern computers can perform generic sets of operations known as programs. These programs enable computers to perform a wide range of tasks.Computers are used to control large and small machines which in the past were controlled by humans. Most people have used a personal computer in their home or at work. They are used for things such as calculation, listening to music, reading an article, writing etc.

Computers are used at homes for several purposes like online bill payment, watching movies or shows at home, home tutoring, social media access, playing games, internet access, etc. ...

Medical Field. ...

Entertainment. ...

Industry. ...

Education. ...

Government. ...

Banking. ...

Business.

BRAINLIEST PLEASE

7 0
2 years ago
Other questions:
  • When are numbered lists generally used?
    14·2 answers
  • Which of the following will you select as X in the following series of clicks to lay the title over a chart: Chart Title box &gt
    14·1 answer
  • When he takes a picture, Simon freezes an action without blurring it, to show movement. Which type of photographer is he?
    9·2 answers
  • UC is trying to switch from legacy CRM to salesforce and wants to keep legacy CRM and salesforce in place till all the functiona
    9·1 answer
  • Write a method named removeDuplicates that accepts a string parameter and returns a new string with all consecutive occurrences
    7·1 answer
  • How do professionals address their problems?
    14·2 answers
  • Can someone help me write an algorithm and a flow chart pls for question 3
    7·1 answer
  • Who play fortnite gameeeeeeee
    14·1 answer
  • Why is making a model, or prototype, important in the design process?
    6·1 answer
  • Develop a program to sort a file consisting of bonks details in the alphabetical order of author names. The details of books inc
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!