1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Reika [66]
3 years ago
7

One of the most common encryption protocols in use today. It is an asymmetric protocol that enables the sharing of a secret key

between two people who have not contacted each other before.
True or False?
Computers and Technology
1 answer:
Thepotemich [5.8K]3 years ago
7 0

Answer:

This explanation is true.

Explanation:

The most common forms of encryption used today are;

  • Data Encryption Standard / DES
  • Triple DES
  • Advanced Encryption Standard / AES
  • Twofish

which are mostly symmetric encryption protocols. They use the same key codes for both parties involved in the communication process.

Asymmetric Encryption is widely used in daily communications that is done over the internet and it uses different keys for each party. The public key encrypts the message and then it is sent over to the recipient. The secret key which they have exchanged is then used the decrypt the message.

I hope this answer helps.

You might be interested in
What is the Is option that prints the author of a file​
sleet_krkn [62]

Answer:

Print.. is your answer...

4 0
3 years ago
What is the best way to improve an online search
Slav-nsk [51]
Best way is to put your exact question! And do "advanced search"

Hope I helped and if you need more info or another question, then feel free to ask me!
Have a nice day!
6 0
3 years ago
Read 2 more answers
What should you do if ads keep popping up on your computer when using Google Chrome?
romanna [79]
I think it’s B.. I’m pretty sure
8 0
3 years ago
Windows workstations all have elements of server software built-in. What are these elements, and why is the Windows Professional
lions [1.4K]

Answer:

The answer is below

Explanation:

Elements of Server software that is built-in, in Windows workstations are:

1. Hard drives,

2. RAM (Random Access Memory)

3. Processors

4. Network adapters.

Windows Professional OS is not considered a server due to the following:

1. Windows Professional OS has a limit on the number of client connections it allowed.

2. Unlike Server, Professional OS uses less memory

2. In comparison to Server, Professional OS uses the CPU less efficiently

4. Professional OS is not built to process background tasks, unlike Server that is configured to perform background tasks.

6 0
3 years ago
In a program, you need to store the identification numbers of 10 employees (as integers) and their weekly gross pay (as double v
dedylja [7]

Answer:

The code to the given question can be given as:

Code:

1)

2 arrays that used to store 10 employee identification number and grosspay amount in parallel and its data-type is int and double.

int Employee_id[10]; //array that store integer value

double Weekly_Gross_Pay[10]; //array that store double value

2)

Define loop for print the details of employees’ identification number and weekly gross pay.

for(int i=0; i<10; i++)  

{  

cout <<Employee_id[i] <<" " << Weekly_Gross_Pay[i] << endl;  

}

Explanation:

The explanation of the above code can be given as:  

In Code (1) we declare two array that's data-type is integer and double. In Employee_id array it store the integer values and Weekly_Gross_Pay it store the double value.

In Code(2) It is used to print the value of array. In that code, we used for a loop because of its entry control loop and we know the size of the array. In this loop, we declare a variable (i) and initialized the value 0 and check the condition(i)less than 1 and increment of i. It prints all the 10 values.  

5 0
3 years ago
Other questions:
  • True or false? It is just too challenging to have different password for every
    12·1 answer
  • which tag does not display the text in the browser window and makes the sources code mode readable ?​
    6·1 answer
  • What will be the output of the following Python code? class A: def test1(self): print(" test of A called ") class B(A): def test
    15·1 answer
  • Why is statistics important?
    6·1 answer
  • Which of the following is not given to a client computer when it is first installed on a TCP/IP network so that it has the appro
    9·1 answer
  • Windows stores information from the Credential Manager application in secure folders called
    5·1 answer
  • The _____ feature will mark all changes made to a document for others to review at a later time.
    13·1 answer
  • Suppose that you have the following declaration:
    7·1 answer
  • What happens when you create a variable in a video game program?​
    5·1 answer
  • What name is given to any changes to the original data such as users manually modifying data, programs processing and changing d
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!