1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
dusya [7]
3 years ago
8

Provide a few examples of how cryptography actually secures data.

Computers and Technology
1 answer:
Anestetic [448]3 years ago
4 0

Answer:

Symmetric, asymmetric and one-way hash cryptography.

Explanation:

Cryptography is a way of protecting data information and communication, using encryption keys and is only decrypted when it gets to the intended receiver.

There are three ways of which cryptography can be used to protect data. They are;

1. Symmetric cryptography

2. Asymmetric cryptography

3. One-way hash cryptography

Symmetric cryptography requires for one key to be used to encrypt and decrypt information. Asymmetric cryptography requires two keys, private and public keys that are mathematically related to encrypt and decrypt information. Both must be used together to encrypt and decrypt data.

One way hash uses an algorithm to convert a random length data to a fixed length encrypted data.

You might be interested in
The advantage of an electronic ____ is that the content can be easily edited and updated to reflect changing financial condition
Lana71 [14]
Computer.................................
6 0
3 years ago
What would be the result of the following code? ages = {'Aaron' : 6, 'Kelly' : 3, 'Abigail' : 1 } value = ages['Brianna']
denis23 [38]

Answer:

This code will no get executed properly.It will give keyerror Brianna.

Explanation:

In this dictionary we defined in the code the there is no key Brianna hence there is no corresponding value to Brianna.So assigning ages['Brianna] to value will obviously give error since there exits no key with this name.So the code will give error.

7 0
3 years ago
Types of email resources. Examples
denis23 [38]
Newsletter emails
Milestone emails
Welcome emails
Review request emails

Hope this helps!
8 0
3 years ago
WNOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOW
beks73 [17]

Answer:

yes.

Explanation:

7 0
2 years ago
Why do we need long-term schedulers? Wouldn't be possible to handle the same job using
Dima020 [189]

Answer:

The scheduling process in the system is done by using the long-term scheduler and short-time scheduler. The long term scheduler are those which select the work from the job queue and the job selection is not very frequent.

Short-term scheduler is the scheduler that select the work from the ready queue and allocates it to the CPU(Central processing unit).It works by picking the work at quick frequency .So, it is not possible for the short-term schedulers to handle the job because of the different frequency of work.

4 0
3 years ago
Other questions:
  • The action in which a router divides and forwards incoming or outbound message traffic to multiple links is known as
    15·1 answer
  • What kind of software consists of programs designed to make users more productive and/or assist them with personal tasks?
    10·1 answer
  • 1)Which of the following statements about the print statement are TRUE? (Check all that apply)
    8·1 answer
  • Jeremy knows that there is a keyboard shortcut in Word, but he does not know what it is. What should Jeremy do to find out what
    6·1 answer
  • Microsoft words spell checker
    9·1 answer
  • You are asked to check your company’s configurations to determine if any filters should be built to stop certain ICMPv6 traffic.
    9·1 answer
  • Identify some advantages of using Excel over lists, paper files, or simple word documents? Describe some disadvantages of using
    15·1 answer
  • Give 5 examples for software ​
    9·1 answer
  • Fill in the blank: Every database has its own formatting, which can cause the data to seem inconsistent. Data analysts use the _
    13·1 answer
  • Identifiy the impact of new technology for your organizations <br>​
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!