1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
dusya [7]
3 years ago
8

Provide a few examples of how cryptography actually secures data.

Computers and Technology
1 answer:
Anestetic [448]3 years ago
4 0

Answer:

Symmetric, asymmetric and one-way hash cryptography.

Explanation:

Cryptography is a way of protecting data information and communication, using encryption keys and is only decrypted when it gets to the intended receiver.

There are three ways of which cryptography can be used to protect data. They are;

1. Symmetric cryptography

2. Asymmetric cryptography

3. One-way hash cryptography

Symmetric cryptography requires for one key to be used to encrypt and decrypt information. Asymmetric cryptography requires two keys, private and public keys that are mathematically related to encrypt and decrypt information. Both must be used together to encrypt and decrypt data.

One way hash uses an algorithm to convert a random length data to a fixed length encrypted data.

You might be interested in
Write pseudo code that performs the following: Ask a user to enter a number. If the
CaHeK987 [17]
Answer:
BEGIN
INPUT N
IF N>0 AND N<10 THEN
OUTPUT "blue"
ELSE
IF N>10 AND N<20 THEN
OUTPUT "red"
ELSE
IF N>20 AND N<30 THEN
OUTPUT "green"
ELSE
OUTPUT "It is not a correct color option"
ENDIF
END.

Explanation:

3 0
2 years ago
Which word processing tool can help you find synonyms to improve your word choice?
deff fn [24]
Grammarly is the answer
6 0
4 years ago
Read 2 more answers
A _____ system allows a customer to request a fax using email, via the company website, or by telephone.
balu736 [363]

A faxback system allows a customer to request a fax using email, via the company website, or by telephone.

<h3>What is faxback?</h3>

Faxback (usually uncountable, plural faxback) An interactive electronic service permitting documents to be downloaded via fax machine. FaxBack searches a pre-assigned database to validate numerals provided while at the same time recovering a caller's name and fax number. Callers without an account can hear a message in- structing them on how to receive an account or be given the option of furnishing a credit card.

FaxBack Fax Machine Solutions add features to the fax machine equivalent to how VoIP added components to the phone: receive fax notification via email and track, archive, and manage faxes via the fax server or service provider control panel.

Hence, A faxback system allows a customer to request a fax using email, via the company website, or by telephone.

To learn more about faxback refer to:

brainly.com/question/13735750

#SPJ4

4 0
1 year ago
What is a possible explanation for the issue described below? A user reports that ever since she or he began creating animations
Marat540 [252]
VRAM because VRAM is used for graphic intensive workloads
8 0
3 years ago
Read 2 more answers
How are some businesses capitalizing on social media at the time of someones death
stiv31 [10]
They'll post condolences messages etc which means many people will discover their business if they are looking for posts mentioning the deceased's name on social media. 
7 0
3 years ago
Other questions:
  • Not providing guarding or fall protection for workers on a 25-foot scaffold. The resulting fall would most likely end in death,
    6·1 answer
  • Which type of software is the most similar to database software?\
    5·1 answer
  • 2. What is a cap? (0.5 points)
    9·1 answer
  • What process periodically validates a user’s account, access control, and membership role on inclusion in a specific group?a. Re
    12·1 answer
  • In a study on software license infringement, those from United States were significantly more permissive than those from the Net
    15·1 answer
  • To save time and avoid formatting errors, you can use the ____ to apply custom formatting to other places in your presentation q
    9·1 answer
  • CORRECT ANSWER GETS BRAINLIEST
    8·2 answers
  • List and describe each of the activities of technology
    11·1 answer
  • Of what is famous Ted Nelson?​
    8·1 answer
  • When adding a component to a container with the ____ layout, specify the NORTH, EAST, SOUTH, WEST, or CENTER position.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!