1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sergey [27]
4 years ago
15

A public key is used for decoding messages in public key/private key asymmetric encryption used over the internet. select one:

Computers and Technology
1 answer:
denpristay [2]4 years ago
5 0
Ffffffffffffffffffffffffffffffffffffffffff
You might be interested in
Host A sends real time voice to Host B over a packet switched network. Host A first converts the analogue voice signal to a digi
DiKsa [7]

Answer:

Time required is 0.007 s

Explanation:

As per the question:

Analog signal to digital bit stream conversion by Host A =64 kbps

Byte packets obtained by Host A = 56 bytes

Rate of transmission = 2 Mbps

Propagation delay = 10 ms = 0.01 s

Now,

Considering the packets' first bit, as its transmission is only after the generation of all the bits in the packet.

Time taken to generate and convert all the bits into digital signal is given by;

t = \frac{Total\ No.\ of\ packets}{A/D\ bit\ stream\ conversion}

t = \frac{56\times 8}{64\times 10^{3}}          (Since, 1 byte = 8 bits)

t = 7 ms = 0.007 s

Time Required for transmission of the packet, t':

t' = \frac{Total\ No.\ of\ packets}{Transmission\ rate}

t' = \frac{56\times 8}{2\times 10^{6}} = 2.24\times 10^{- 4} s

5 0
3 years ago
What can we learn from the example of the wi-fi alliance with regard to the necessity of networking standards?
Vera_Pavlovna [14]
The Wi-Fi alliance is an alliance that promotes the wireless technologies and the interoperability between them. It defines the the security of the wireless technologies and the application protocols. From this example we can learn that is crucial to have one platform that defines the main characteristic of a type of network in order to have strictly defined standards and protocols, and by doing so, have interoperable networks. 
7 0
3 years ago
Which category best represents: during class, students use their mobile phones to share answers to an assignment?
Studentka2010 [4]
The best category is cheating
5 0
3 years ago
Read 2 more answers
Which of the following would be considered the highest risk portfolio?
sashaice [31]

The best option is (C) A portfolio made up of 60% stocks, 30% mutual funds, and 10% Treasury bonds.

There are a lot of risks involved when investing in almost anything. You may end up paying a lot for something that may not be worthwhile and at the end of it all end up losing a lot more than you get. In this case, more than half of the money has been invested in stocks and the prices of stocks change daily. Investing in stocks may give a good return but remains high risk to involve yourself in and should be avoided as much as possible.






4 0
3 years ago
Which file extension indicates the file is a Microsoft Word document?
Ivan

the answer to your question is ".docs"

3 0
4 years ago
Other questions:
  • Which of these is a weakness of written communication?
    8·1 answer
  • Why is it that even though there aren't the max number of answers on a question, (or sometimes even NO answers) When I click the
    11·1 answer
  • Many computer users, especially beginners, find ________ interfaces difficult to use.
    15·1 answer
  • Concept tests in the screening and evaluation stage of the new-product process rely on written descriptions, sketches, or mock-u
    7·1 answer
  • Differences between electromechanical era and electronic era in point.<br>PLZ HELP​
    6·1 answer
  • Write an expression using membership operators that prints "Special number" if special_num is one of the special numbers stored
    12·1 answer
  • A service technician removed the inspection/fill plug from the differential of a rear-wheel- drive vehicle and gear lube started
    8·1 answer
  • A selected graphic appears surrounded by a(n) ______, which has small squares and circles around its edges.
    7·1 answer
  • In Google search results, how are organic links different from sponsored links?
    5·2 answers
  • Before we can use the PS Session to remotely manage a target system, there are certain tasks we must perform, such as create exc
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!