1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Zanzabum
3 years ago
7

Which of the following statements is true of a cookie? a. A cookie can create copies of itself and spread to other networks to e

xecute and replicate again. b. The one time password of a transaction is captured and stored under a cookie on a company’s Web server. c. A cookie pulls data from disparate data sources to populate and maintain a data warehouse. d. Data about user preferences and activity is captured and stored under a cookie on a company’s Web server.
Computers and Technology
1 answer:
Ilya [14]3 years ago
8 0

Answer: D.

Data about user preferences and activity is captured and stored under a cookie on a company’s Web server.

Explanation: The most common and best-known technology for user tracking is the use of cookies. Other known online website tracking tools are tracking pixels (or pixel tags), web beacons (or ultrasound beacons), and browser fingerprinting (or digital fingerprinting), amongst others.

a cookie will contain a string of text that contains information about the browser. To work, a cookie does not need to know where you are from, it only needs to remember your browser. Some Web sites do use cookies to store more personal information about you.

You might be interested in
5. What is a domain name used for?​
Mnenie [13.5K]

<u>Answer:</u>

Domain names serve to identify Internet resources, such as computers, networks, and services, with a text-based label that is easier to memorize than the numerical addresses used in the Internet protocols. A domain name may represent entire collections of such resources or individual instances.

<u />

<u>Explanation:</u>

*Hope this helps*

7 0
3 years ago
2. Research, find and use a better (different from the simple Shift Cipher) encryption technique to encrypt a string of your cho
Kruka [31]

Answer:

There are two better techniques for encryption as compared to shift cipher. One is block cipher. Such techniques use one key for both encryption and decryption. For example Advanced Encryption Standard (AES). This is based on symmetric key encryption.

The other way is to use asymmetric key encryption technique which based on two keys i.e. public and private key for encryption and decryption. For example, Rivest-Shamir-Adleman (RSA).

Explanation:

What is AES?

Advanced Encryption Standard (AES) is a symmetric key block cipher  which uses 128, 192 or 256-bit keys  length to encrypt and decrypt a block of plain text or message. It is stronger and faster than Shift Cipher encryption technique. It can encrypt data blocks of 128 bit using the above mentioned bit key lengths. The greater then key length the greater the security. the number of rounds in AES is variable and depends on the length of the key. The length of these keys determines the number of rounds for example 128 bit keys has 10 rounds, 12 rounds for 192 bit keys and 14 rounds for 256 bit keys. Each rounds involves some processing. This process is explained below:

How AES works?

The data is divided into each of size 128 bits makes a matrix of 4x4 columns of 16 bytes. (bytes because AES takes 128 bit plain text block as 16 bytes)

Substitution: First the data is substituted using a fixed substitution table which is predetermined. This makes a matrix of rows and columns.

Shifting: Each rows of the matrix is shifted to the left and the dropped entries in row are inserted on the right. Shift is carried out as follows −  

Mixing columns: Use a mathematical method/equation to transform the columns where the input of the method is each column of data which is then replaced by this function into a different new matrix of data(bytes). This is basically the first round to transform plain text to cipher text. Now consider these bytes as 128 bits, the first round key is added to these resultant column bits by XOR. A separate portion of the encryption key length is used to perform the transformation on each column. The number of rounds depend on the the key length.

After the first round key comes the second round key and so on and when the last round key is added then this whole process goes back to Substitution phase, then shifting rows phase, then mixing columns and another round key is added after this. For example, if 128 bit key is used this means there will be nine such rounds.

Advantages

AES supports large key sizes which makes it more secure and stronger than shift cipher encryption techniques which can be cracked because of their small key space. If someone wants to decrypt a message and knows it's encrypted by a Shift Cipher technique then the key space of all possible keys is only the size of the alphabet. This is a very small scale.  An attack such brute force attack attempting all 26 keys or even using exhaustive technique will easily crack this. So AES having large key size is more robust against cracking. For example in AES in order to crack an encryption for 128 bit around 2128 attempts are needed. Also for a 256 bit key, 2256 different combinations attempts are needed to ensure the right one is included which makes it harder to crack and makes is more secure.

I have used an internet solver to encrypt a string and i am attaching the result of the encryption. The plain text is: Two One Nine Two

The key is Thats my Kung Fu

and the cipher text in hexadecimal after using AES is:

29 c3 50 5f 57 14 20 f6 40 22 99 b3 1a 02 d7 3a

8 0
3 years ago
can somebody tell me what straykids 2021 collab is gonna be with because i think its gonna be with blackpink
valkas [14]

Answer:

Red velvet: Red Velvet made its debut in 2014, so it is highly probable that SM Entertainment might announce whether or not members of the group will continue to stay in the company by the end of 2021.

Explanation:

Probably black and white, or gold and white Or Gucci clothes.

7 0
2 years ago
Read 2 more answers
You work as a Network Administrator for wwwpany Inc. You have suspected a bad driver or perhaps malware. Which of the following
vichka [17]

Answer:

Explanation:

There is a solution called ETA (Encrypted Traffic Analytics) this is a security advanced network that helps us to identify malware between the encrypted data, but with this tool is no necessary to break any protection and privacy chain.

This technology use machine learning to read all the traffic without deciphering it, in this way we can detect a difference between reliable and malicious traffic.

En windows we can use Microsoft Security Essentials like antivirus and detect virus, we can use Process Explorer, analyze the traffic, we can use Microsoft Network Monitor.

8 0
3 years ago
What is the acceptable voltage on a house electrical outlet? And where should the tester knob be pointing to?
k0ka [10]
A outlet has a acceptable voltage of 120 vollts and the knob depends on the tester you are using
3 0
3 years ago
Other questions:
  • What is the output of this code? import java.util.HashSet; class A { public static void main(String[ ] args) { HashSet set = new
    15·1 answer
  • Array elements must be ________ before a binary search can be performed.
    8·1 answer
  • HELP AS SOON IS A UNIT TEST WILL GIVE BRAINLIEST
    9·2 answers
  • Which of the following is a characteristic of the internet today? distributed network central hub lack of protocols absence of c
    5·1 answer
  • Which of the following modes of replication requires a very low latency network connection and ensures data remains in synch wit
    9·1 answer
  • Write a machine-language program to add the three numbers 2, –3, and 6 and output the sum on the output device. Write it in a fo
    11·1 answer
  • Jacob is a website designer. Whenever his company takes on a new project, Jacob takes the initiative and comes up with ideas and
    14·1 answer
  • 4
    15·2 answers
  • Note that common tasks are listed toward the top, and less common tasks are listed toward the bottom. According to O*NET, what a
    14·1 answer
  • What two things should you do before starting the design process
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!