1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
aniked [119]
3 years ago
8

Asymmetric key encryption combined with the information provided by a. certificate authority allows unique identification of the

user of encrypted data. b.the provider of encrypted data. c. both the user and the provider of encrypted data. d. either the user or the provider of encrypted data.
Computers and Technology
1 answer:
Nesterboy [21]3 years ago
5 0

Answer:

c. both the user and the provider of encrypted data.

Explanation:

In assymetric key encryption, you will need the public key of the sender to decode the information along with your private key to decode the encrypted information. if you don't have any of the keys, you won't be able to read the information. You must have both in order to read the information sent.

You might be interested in
A friend complains that she is always running out of money even though she “never buys anything expensive.” What advice would yo
Paraphin [41]
To not buy anything unless it is 100% necessary.
4 0
4 years ago
Read 2 more answers
Which data type is -7
bixtya [17]

Answer:

integer

Explanation:

4 0
3 years ago
Once Google Analytics processes data, it’s stored in a database where it can’t be modified.
Svet_ta [14]

Answer:

The answer to this question is true.

Explanation:

Google Analytics is the method of free tracking device which is offered by Google. Google Analytics shows how User visits website. It helps you exactly see the number of visitors that you store in the database.

It offers information about user behavior that can be critical for your business. The google Analytics refers a reference number which cannot be modified .So the given statement is true.

6 0
3 years ago
Select the best option that should be considered when preparing these images to.be used for the web
DerKrebs [107]
The answer is 1) JPEG  2) TIFF   3) BMP.  
<span>The best option that should be considered when preparing these images to.be used for the web :
</span>1) JPG (jpeg) - Used to compress web images to a small file size without
    sacrificing quality
2) TIFF (tiff) - Used for professional print images to save in a uncompressed 
     file format at high resolution.
3) BMP - Used for either web or print because of the ability to save high
    quality images ether compressed or uncompressed.
6 0
3 years ago
Basic python coding, What is the output of this program? Assume the user enters 2, 5, and 10.
r-ruslan [8.4K]

Answer:

17.0

Explanation:

after first loop numA = 0.0 + 2 = 2.0

after second loop numA = 2.0 + 5 = 7.0

after third loop numA = 7 + 10 = 17.0

8 0
3 years ago
Other questions:
  • Developers work together with customers and useras to define requirements and specify what the proposed system will do. If once
    9·1 answer
  • The dlci field in the frame relay header is _________ bits long.
    14·1 answer
  • A network using multiple cell towers falls under which type of network?
    13·1 answer
  • .A menu within a menu is called what? (nested menu ,submenu ,recursive menu ,formal list )
    12·1 answer
  • You have been asked to create a Community leveraging Out-of-the-box login, logout, self-registration, and error pages. Would you
    5·1 answer
  • Consider the following C code fragment:
    10·1 answer
  • Any part of the computer that you can touch is called ________.
    6·1 answer
  • The type value ____ for the input element may cause modern browsers to validate entries to ensure that they are valid web addres
    14·1 answer
  • Who invented the first mechanical computer? in what year was it invented?.
    11·1 answer
  • Type the correct answer in the box. Spell all words correctly.
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!