1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Reika [66]
3 years ago
7

One of the most common encryption protocols in use today. It is an asymmetric protocol that enables the sharing of a secret key

between two people who have not contacted each other before.
True or False?
Computers and Technology
1 answer:
Thepotemich [5.8K]3 years ago
7 0

Answer:

This explanation is true.

Explanation:

The most common forms of encryption used today are;

  • Data Encryption Standard / DES
  • Triple DES
  • Advanced Encryption Standard / AES
  • Twofish

which are mostly symmetric encryption protocols. They use the same key codes for both parties involved in the communication process.

Asymmetric Encryption is widely used in daily communications that is done over the internet and it uses different keys for each party. The public key encrypts the message and then it is sent over to the recipient. The secret key which they have exchanged is then used the decrypt the message.

I hope this answer helps.

You might be interested in
1. I write about my travel experiences on my own personal ____?
alekssr [168]

Answer:

Hello There!!

Explanation:

1.blog

2.laptop

hope this helps,have a great day!!

~Pinky~

4 0
3 years ago
In which scenario would instant messaging be more useful than other forms of communication?
ivann1987 [24]
When you're busy doing things and/or be too sick for over the phone communication
7 0
3 years ago
When a number gets assigned to a variable that already has a value __________?
Aleksandr-060686 [28]
A already assigned variable cannot be assigned twice You can make the variable change over to a new one or call a whole new one to assign one without a value or It might be possible to do v=n (v is variable and n is number / value)
3 0
2 years ago
You also learn in class that one kilobyte of computer memory will hold about 2/3 of a page of typical text (without formatting).
Travka [436]

Answer:

The flashdrive can hold 35389 400-pages-books

Explanation:

If \frac{2}{3} of a page occupies 1 kB of memory, we can calculate how much memory a book will take

2/3kB=1 page\\ x kB=400 pages\\266.67 kB=400 pages

Now that we know that a book average file size is about 266,67 kB, we calculate how many of them can a 9 GB flash drive hold.

To do the calculation, we have to know how many kilobytes are in 9 gigabytes.

There is 1024 kilobytes in a megabyte, and 1024 megabytes in a gigabyte, so:

Memory_{in _kilobytes}^{} =1024\frac{kilobytes}{megabytes} *1024\frac{megabytes}{gigabytes}*9=9437184 kilobytes

Finally, knowing the average file size of a book and how much memory in kilobytes the 9 GB flash drive holds, we calculate how many books can it hold.

Books=\frac{Flash drive memory}{Filesize of a book} =\frac{9437184kilobytes}{266.67\frac{kilobytes}{book} } =35389,4 books

The flashdrive can hold 35389 400-pages-books, or 14155776 pages of typical text.

8 0
3 years ago
Please help me very important
3241004551 [841]

Answer:

C, Or D.

Explanation:

<em>Because A speed enhancing hard drive Can store any type of quick file if you just click on it will load fast. Same thing goes for a hard drive but you have to transfer the file</em>

4 0
2 years ago
Other questions:
  • Which type of network cover a large geographical area and usually consists of several smaller networks, which might use differen
    5·1 answer
  • Software that was designed to serve the needs of a specific company or organization is called:
    5·1 answer
  • You order a new personal computer. A representative from the store calls to ask if you need CD-copying software in your personal
    12·1 answer
  • Once sales are​ forecasted, ________ must be generated to estimate required raw materials. A. a pro forma statement B. a product
    8·1 answer
  • How does a layered pattern make use of abstraction and encapsulation?
    10·1 answer
  • You use a cisco 2900 router in your network. you are considering purchasing and implementing the Unifield communications feature
    8·1 answer
  • You have a large TCP/IP network and want to keep a host's real time clock synchronized. What protocol should you use?
    10·1 answer
  • Audiovisual means that a presentation combines film and photos.<br> true or false?
    6·2 answers
  • There is a renewed focus among today’s parents on providing food to their family.
    6·1 answer
  • Fwee Pwoints Fwor You
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!