1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
dusya [7]
3 years ago
8

Provide a few examples of how cryptography actually secures data.

Computers and Technology
1 answer:
Anestetic [448]3 years ago
4 0

Answer:

Symmetric, asymmetric and one-way hash cryptography.

Explanation:

Cryptography is a way of protecting data information and communication, using encryption keys and is only decrypted when it gets to the intended receiver.

There are three ways of which cryptography can be used to protect data. They are;

1. Symmetric cryptography

2. Asymmetric cryptography

3. One-way hash cryptography

Symmetric cryptography requires for one key to be used to encrypt and decrypt information. Asymmetric cryptography requires two keys, private and public keys that are mathematically related to encrypt and decrypt information. Both must be used together to encrypt and decrypt data.

One way hash uses an algorithm to convert a random length data to a fixed length encrypted data.

You might be interested in
Who was the father of computer​
masya89 [10]

Answer:

elon musk

Explanation:

8 0
3 years ago
What is the encryption cipher that was the precursor to des??
Elanso [62]
DES works by using the same key to encrypt and decrypt a message, so both the sender and the receiver must know and use the same private key. Once the go-to, symmetric-key algorithm for the encryption of electronic data, DES has been superseded by the more secure Advanced Encryption Standard (AES) algorithm.
8 0
3 years ago
Vendors who use open source as part of their product offerings can expect to bring new products to the market faster because: Gr
tamaranim1 [39]

Answer:

A.  they can skip whole segments of the software development process.

Explanation:

A software development process refers to the process of dividing software development work into various phases for product management, project management and to improve the design.

Vendors who use open source as part of their product offerings can expect to bring new products to the market faster because they can skip whole segments of the software development process.

They don't have to go through different phases of software development.

6 0
3 years ago
Write a sed command that will display all lines of the birthday file that do not contain the string March. What was the sed comm
Dmitriy789 [7]

Answer:

sed '/march/{d;}' birthdays.txt > result .txt

Explanation:

sed syntax is basically:

<em>sed '/expression/{command;command;...;}' inputfile > outputfile</em>

  • First, for the expression part, we use /march/ to match all lines containing that string.
  • Then for the command part, we only use {d} command to delete every matching line found.
  • The third part contains the input file to process, I have named it birthdays.txt, but it could have been any other file needed.
  • Finally "> result .txt" makes the script output to be saved into a file named result.txt
6 0
2 years ago
Cuando se creo argentina​
vekshin1

Answer:

Argentina se creó tras su independencia respecto de España el 9 de julio de 1816, tras 6 años de guerra por la independencia del país, donde líderes como Manuel Belgrano, Martín Miguel de Güemes y José de San Martín derrotaron a los españoles.

La unidad nacional de los argentinos, a su vez, se originó tras las invasiones inglesas de 1806 y 1807, y se consolidó tras la conquista de España por parte de los Bonaparte, que dio origen a la Revolución de Mayo de 1810, donde los argentinos decidieron imponer un gobierno propio.

7 0
3 years ago
Other questions:
  • Being tired has very similar effects on the body as what
    7·1 answer
  • How does information technology most benefit people’s personal and professional lives?
    9·2 answers
  • The left column values in a table array are called table ____
    13·1 answer
  • How many homes can be warmed by one bugatti
    11·2 answers
  • Please help me please and thank you!
    14·1 answer
  • There are several vehicles in a parking lot. Some of them are motorcycles
    8·2 answers
  • How many generations of computer languages have there been since the middle of the 20th century?
    10·1 answer
  • Describe the positive and negative effects of Internet​
    6·2 answers
  • Jemima is reviewing her history report and notices that her headings are not formatted the same throughout the
    7·1 answer
  • Many of the first photographers were actually scientists and inventors. True or false?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!