1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Aloiza [94]
3 years ago
10

A digital certificate system Group of answer choices uses third-party CAs to validate a user's identity. uses digital signatures

to validate a user's identity. uses tokens to validate a user's identity. is used primarily by individuals for personal correspondence.
Computers and Technology
2 answers:
serg [7]3 years ago
6 0

Answer:

uses third-party CAs to validate a user's identity.

Explanation:

Digital certificate is an electronic file which can be used to verify the identity of a party on the Internet. A digital certificate can be likened to an electronic passport of the internet.

It is issued by an organization called a certificate authority (CA).

A digital certificate system uses a trusted third party (certification authority), to validate a user's identity.

kkurt [141]3 years ago
3 0

Answer: A. Uses third-party CA's to validate a users identity.

Explanation:

A digital certificate is a binding electronic document used in the exchange of messages between a sender and receiver across the internet. It is useful in validating the identities of all users so that none can deny either sending or receiving a message. It also offers some protection to the data sent and received.

Certification Authorities are recognized bodies who have the responsibility of ensuring the true identities of users. After achieving this they then issue a certificate that can serve as a guarantee. A public key is present in the certificate which only the true users can access.

These Certification Authorities would then confirm that the key and digital signature matches the identities of the users.

You might be interested in
I need to calculate the % of Grand Total on Microsoft Excel, but can't for the life of me remember how to do that. Help would be
vagabundo [1.1K]

Answer:

You need to first use the Sum function to add up all the costs of September.

Then divide each September cost by the grand total that you got. After that format the last column to be percentages.

Look at the attached file for the formulas used.

Download xlsx
4 0
3 years ago
What is Roko's Basilisk?
serious [3.7K]

Answer:

Roko’s basilisk is a thought experiment proposed in 2010 by the user Roko on the Less Wrong community blog. Roko used ideas in decision theory to argue that a sufficiently powerful AI agent would have an incentive to torture anyone who imagined the agent but didn't work to bring the agent into existence.

7 0
3 years ago
________ is used to install and update software, backup, and restore mobile devices, wipe employer software and data from device
erastovalidia [21]

Answer: MDM softwares

Explanation:

Here MDM refers to mobile device management software which provides people with the facilities of updating, installing creating backup of various mobile devices within an organisation. Moreover these software's provides tools for proper monitoring and to report their usage across various independent mobile device users. MDM is often used or interconnected with the term BYOD(Bring your own device), whereby employees of an organisation bring their own mobile devices and they are being managed by a MDM software centrally.

8 0
4 years ago
What is online school like 3 sentences
lara [203]

Answer:

its okay. i mean like you have to do a bunch off stuff. andsomtimes it gets a little boring.

Explanation:

i am doing online school.

3 0
4 years ago
Read 2 more answers
Why is the Vietnam War referred to as The Living Room War
Vitek1552 [10]
Television reduced the space between the war and the person watching the TV. When the media showed the intensity and the chaos of the war, it helped turn people against it.
8 0
3 years ago
Other questions:
  • The voluntary linkage of computer networks around the world is called the ______.
    7·1 answer
  • ________ is a model of computing in computer processing, storage, software, and other services which are provided as a shared po
    9·1 answer
  • (Please answer! Correct answer gets brainliest!)
    5·2 answers
  • ________________are programs that designed to help users to be more productive with their personal tasks
    11·2 answers
  • 3. When you right-click a linked spreadsheet object, what commands do you choose to activate the Excel features?
    7·2 answers
  • Describe two circumstances where access services might get implemented by organizations please.​
    9·1 answer
  • Examples of application software​
    7·2 answers
  • How do I install another part on campaign call of duty cold war? please help.(best answer will get branliest.)
    15·2 answers
  • Read-only memory chips are used to
    11·1 answer
  • In what ways are super computer different from mainframe computers.​
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!