1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
klemol [59]
3 years ago
11

​Eamon wants to provide a discount to premium buyers who order in large quantities. He wants to create a code for each price and

share it with them. Also, he wants to ensure that only the premium buyers can decipher the code shared. In this scenario, which of the following codes would you suggest Eamon to use?
A. ​Cipher code
B. ​Mnemonic code
C. ​Action code
D. ​Derivation code
Computers and Technology
1 answer:
SCORPION-xisa [38]3 years ago
3 0

Answer:

The correct answer for the following question will be A. Cipher code.

Explanation:

Cipher code:

Ciphers are potentially the cryptographic central pillar. A cipher is usually an algorithm to perform both encryption and decryption.

Secret key encryption relies on the use of symmetric ciphers. Whether the goal is to convert plaintext to ciphertext and vice-versa. The secret key is shared on both ends, and the person having the secret key can only encrypt and decrypt the data.

So, option A is a suitable answer.

You might be interested in
What is the first character for a file or directory names if they should not be displayed by commands such as ls unless specific
riadik2000 [5.3K]

Answer: The .(dot) character

Explanation: in Linux, the period (dot) is short hand for the bash built in source. It will read and execute commands from a file in the current environment and return the exit status of the last command executed.

The .(dot) character is the first character for a file or directory names if they should not be displayed by commands such as ls unless specifically requested

4 0
4 years ago
List three functions that you can perform with a database that you cannot perform with a spreadsheet.
Delicious77 [7]
There are some function which can be performed with database but not with a spread sheet, these functions include: 
1. Enforcement of data type.
2. Support for self documentation.
3. Defining the relationship among constraints in order to ensure consistency of data.
5 0
3 years ago
Horizontal scaling of client/server architecture means _____.
aalyn [17]
<span>Horizontal scaling of client/server architecture means that more machines or more client workstation are added in the network. The impact on the network should be small and negligible. 
Vertical scaling on the other hand means that more power (processing units) are added in the network. </span>
4 0
3 years ago
In the insert table of figures dialog box which drop down menu do you use to choose what information is displayed in the table
Mashutka [201]

Answer:

caption label

Explanation:

8 0
3 years ago
How I delete my account of Brainly?
seropon [69]

Answer:

The option to remove your account may be found under Privacy in your Profile Settings.

When you click the box labeled "I wish to remove my account," a request to delete the account will be issued.

Explanation:

5 0
2 years ago
Read 2 more answers
Other questions:
  • Explain the purpose of Data Layer, in the Layered modelfor web applications?
    6·1 answer
  • An ______ search is when the buyer looks for information beyond personal knowledge to help make the buying decision, such as che
    10·1 answer
  • Question 1 (1 point)
    10·2 answers
  • What can you use with your keywords to narrow your search if you complete an internet search using a search engine and do not ge
    15·2 answers
  • A direct-mapped cache holds 64KB of useful data (not including tag or control bits). Assuming that the block size is 32-byte and
    14·1 answer
  • When is 1600 plus 25 and 1700 minus 35 the same thing?​
    10·1 answer
  • In matlab how would this specific code be written and how could I ask the user to enter a vector of coefficients for the polynom
    10·1 answer
  • Guys, it took me 3 seconds to get banned on brainly, try to beat that, actually don't, unless you don't care about your account
    6·2 answers
  • Have you ever tried using such a camera?​
    5·1 answer
  • Which of the following are safety guidelines when socializing online?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!