Answer:
Symmetric, asymmetric and one-way hash cryptography.
Explanation:
Cryptography is a way of protecting data information and communication, using encryption keys and is only decrypted when it gets to the intended receiver.
There are three ways of which cryptography can be used to protect data. They are;
1. Symmetric cryptography
2. Asymmetric cryptography
3. One-way hash cryptography
Symmetric cryptography requires for one key to be used to encrypt and decrypt information. Asymmetric cryptography requires two keys, private and public keys that are mathematically related to encrypt and decrypt information. Both must be used together to encrypt and decrypt data.
One way hash uses an algorithm to convert a random length data to a fixed length encrypted data.
<em>(I'm not a lawyer, I'm not your lawyer, and this isn't legal advice.)</em>
You should ensure you have permission to use the image.
Most commonly, this will happen in one of two forms:
- The image already has a free license allowing you to use it. (Generally, this will be a Creative Commons license.) Follow the terms specified and you should be all set!
- If the image isn't already licensed freely online, you'll need to ask the photographer or publisher for permission to use the image. In this case, a quick email is usually enough to get the ball rolling.
In either case, you should generally have explicit permission from the person who created the picture for you to reuse and share it.
(There are some cases in which "fair use" will apply and you may not need permission from the copyright owner, but this varies on a case-by-case basis. I encourage you to do your research on that area if needed.)
A) 12 cells is the correct answer
Yes be ur self don’t let anyone bring u down
Explanation:
Both perform almost the same function of storing data, performing numerical calculations, formating cells, and to generate reports.
However, when dealing with data that is short term (requiring less updating) Microsoft Excel is recommended as it provides easy spreadsheet functions. Access on the other hand is a more complex application for data analysis involving constantly changing data values that are long term based. Access allows for efficient data analysis using complex tools such as import module, automated queries etc.