1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
dusya [7]
3 years ago
8

Provide a few examples of how cryptography actually secures data.

Computers and Technology
1 answer:
Anestetic [448]3 years ago
4 0

Answer:

Symmetric, asymmetric and one-way hash cryptography.

Explanation:

Cryptography is a way of protecting data information and communication, using encryption keys and is only decrypted when it gets to the intended receiver.

There are three ways of which cryptography can be used to protect data. They are;

1. Symmetric cryptography

2. Asymmetric cryptography

3. One-way hash cryptography

Symmetric cryptography requires for one key to be used to encrypt and decrypt information. Asymmetric cryptography requires two keys, private and public keys that are mathematically related to encrypt and decrypt information. Both must be used together to encrypt and decrypt data.

One way hash uses an algorithm to convert a random length data to a fixed length encrypted data.

You might be interested in
p25: File Write and Read1) User enters a file name (such as "myMovies.txt").2) User enters the titles of 4 of their favorite mov
SCORPION-xisa [38]

Answer:

<em>The program goes as follows  </em>

<em>Comments are used to explain difficult lines</em>

#include<iostream>

#include<fstream>

#include<sstream>

#include<string>

using namespace std;

int main()

{

//Declare String to accept file name

string nm;

//Prompt user for file name

cout<<"Enter File Name: ";

getline(cin,nm);

//Create File

ofstream Myfile(nm.c_str());

//Prompt user for 4 names of movies

string movie;

for(int i = 1;i<5;i++)

{

 cout<<"Please enter a movie title #"<<i<<": ";

 cin>>movie;

 //Write to file, the names of each movies

 Myfile<<movie<<endl;

}

Myfile.close(); // Close file

//Create an Array for four elements

string myArr[4];

//Prepare to read from file to array

ifstream file(nm.c_str());

//Open File

if(file.is_open())

{

 for(int i =0;i<4;i++)

 {

  //Read each line of the file to array (line by line)

  file>>myArr[i];

 }

}

file.close(); // Close file

//Create a reverseOrder.txt file

nm = "reverseOrder.txt";

//Prepare to read into file

ofstream Myfile2(nm.c_str());

for(int j = 3;j>=0;j--)

{

 //Read each line of the file to reverseOrder.txt (line by line)

 Myfile2<<myArr[j]<<endl;

}

Myfile2.close(); //Close File

return 0;

}

See attached for .cpp program file

Download cpp
6 0
3 years ago
Computers infected by a virus, worm, or Trojan horse that allows them to be remotely controlled for malicious purposes are calle
yuradex [85]

Blaster Worm., the worm has been designed to tunnel into your system and allow malicious users to control your computer remotely. A Trojan horse is not a virus. It is a destructive program that looks as a genuine application. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive.

4 0
2 years ago
What is a nonlinear presentation?
TEA [102]
The answer is A. For example, you could start at slide 8 and jump to slide 2 and then to 3. It does not follow and linear structure!!
8 0
3 years ago
Read 2 more answers
Which of the operating systems listed below was the last to be released
Elena-2011 [213]

Mac OS came out in 2001. This is software that was created by Apple to run the "Mac Computers." This software is still used to this day.

MS-DOS came out in 1981. This is software that was created by Microsoft to run x86 computers. This software is no longer used.

Windows New Technology came out in 1985. This is software that was created by Microsoft to run a ton of different computers. This software is still used to this day.

Windows Vista came out in 2006. This software that was created by Microsoft to run a variety of personal computers. This software is no longer used.

By the information given, Windows Vista was the last to be released.

Best of Luck!

8 0
3 years ago
Generally, websites ending in .edu, .gov, and .org are less likely to be biased, or to show preference toward a certain financia
svetlana [45]

Answer:

True

Explanation:

Domain extensions always appear at the end of a website's address.

It's a means to categorise websites.

.edu domains are used for educational purposes

.gov are restricted to by government entities

.org is largely used by nonprofit websites.

While

.net is derived from the word network, indicating it was originally intended for organizations involved in networking technologies, such as Internet service providers and other infrastructure companies

.biz is intended for registration of domains to be used by businesses

The right domain extension adds credibility and memorability to your website by aligning it with a specific brand purpose.

8 0
3 years ago
Other questions:
  • Olivia needs to get permission to use a graph of data gathered by a trade association she plans to include the graph in a report
    10·2 answers
  • What is the last step in planning your budget
    11·1 answer
  • Two electronics technicians are measuring electrical quantities in circuits. Technician A says that copper, glass, porcelain, an
    11·1 answer
  • If you enjoy working with livestock, the best cluster in which to research careers would be: A. Health Science. B. Agriculture,
    11·1 answer
  • Which technology can be used to protect the privacy rights of individuals and simultaneously allow organizations to analyze data
    13·1 answer
  • Given an array of integers and the size of the array, write a function findDuplicate which prints the duplicate element from the
    11·1 answer
  • What is the ability for a system to respond to unexpected failures or system crashes as the backup system immediately and automa
    8·1 answer
  • Por favor alguem poderia me falar qual PC e melhor: Computador Gamer Fox PC FPS Intel Core i5 8GB (GeForce GTX 1050Ti 4GB GDDR5)
    15·1 answer
  • Suppose testcircle1 and circle1 in listing 9.1 are in two separate files named testcircle1.java and circle1.java, respectively.
    14·1 answer
  • After Daniel performed poorly on a test, his teacher advised him to do some self-reflection to figure out how he could get a bet
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!