1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
aniked [119]
2 years ago
8

Asymmetric key encryption combined with the information provided by a. certificate authority allows unique identification of the

user of encrypted data. b.the provider of encrypted data. c. both the user and the provider of encrypted data. d. either the user or the provider of encrypted data.
Computers and Technology
1 answer:
Nesterboy [21]2 years ago
5 0

Answer:

c. both the user and the provider of encrypted data.

Explanation:

In assymetric key encryption, you will need the public key of the sender to decode the information along with your private key to decode the encrypted information. if you don't have any of the keys, you won't be able to read the information. You must have both in order to read the information sent.

You might be interested in
Why is the DNS service included in Windows Server 2012 R2 integrated with DHCP service?
jekas [21]
The answer is "<span>To allow a DHCP server to request a DNS server to update or create a record.</span>"
Hope this helped and have a nice day!!
5 0
2 years ago
how can I make a 108KB sound into a 108Mb sound it wont upload if its KB on garageband pls help I'm trying to make a ringtone on
Likurg_2 [28]
Dmjdjdhdndndndjdjdsjsjsnsns
4 0
2 years ago
Read 2 more answers
How are a members details be checked and verified when they return to log back in to the website ?
aksik [14]

Answer:

When you sign into a website, you have to enter a password and username most of the time, which will allow the website to know that you have checked in and it is you, who is using your account.

6 0
2 years ago
In microsoft windows, when a window is minimized, which of the following happens to that window?
Gnoma [55]

The window doesn't terminate, it just gets smaller and it may be closed at the bottom of your computer screen. All you have to do is click on the closed window at the bottom of your screen to re-open it! :) The window doesn't terminate, it just gets smaller and it may be closed at the bottom of your computer screen.

3 0
2 years ago
$
IrinaK [193]

Answer:

Windows media video

Explanation:

it is the most recognizable video compression format within the WMV family

4 0
2 years ago
Read 2 more answers
Other questions:
  • Create a Binary Expressions Tree Class and create a menu driven programyour program should be able to read multiple expressions
    15·1 answer
  • Create a Racket procedure compute_pos that reads numbers from the keyboard until 0 is read, count how many positive numbers are
    12·1 answer
  • Consider Ron’s budget. How much money does Ron have left over each month?
    9·2 answers
  • 1 #Write a function called phonebook that takes two lists as
    13·1 answer
  • Assume that ip has been declared to be a pointer to int and that enrollment has been declared to be an array of 20 elements . As
    13·1 answer
  • Which field of study would be most useful for a person who wants to work in a recycling plant?
    12·2 answers
  • 5. An entrepreneur who continues to find new and better ways of doing things is ____.
    10·1 answer
  • An example of software is a
    8·1 answer
  • The Python language uses a compiler which is a program that both translates and executes the instructions in a high-level langua
    15·1 answer
  • How is cell phone usage changing American Society? Is this a good change or a bad change? Explain.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!