1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
aniked [119]
2 years ago
8

Asymmetric key encryption combined with the information provided by a. certificate authority allows unique identification of the

user of encrypted data. b.the provider of encrypted data. c. both the user and the provider of encrypted data. d. either the user or the provider of encrypted data.
Computers and Technology
1 answer:
Nesterboy [21]2 years ago
5 0

Answer:

c. both the user and the provider of encrypted data.

Explanation:

In assymetric key encryption, you will need the public key of the sender to decode the information along with your private key to decode the encrypted information. if you don't have any of the keys, you won't be able to read the information. You must have both in order to read the information sent.

You might be interested in
If you want an app to reach the largest possible audience, which two platforms should you use?
GREYUIT [131]

Android Studio for Android, and Xcode for Apple devices.

5 0
3 years ago
A personal business letter is a letter that is ____.
Simora [160]

Answer:

Explanation:

One group of students did an experiment to study the movement of ocean water. The steps of the experiment are listed below.

Fill a rectangular baking glass dish with water.

Place a plastic bag with ice in the water near the left edge of the dish.

Place a lighted lamp near the left edge of the dish so that its light falls directly on the plastic bag.

Put a few drops of ink in the water.

The student did not observe any circulation of ink in the water as expected because the experiment had a flaw. Which of these statements best describes the flaw in the experiment? (2 points)

Not enough ink was added.

Not enough water was taken.

The dish was too small for the experiment.

The lamp and the ice bag were at the same place.

8 0
3 years ago
In the context of machine learning, an artificial neural network (ann) is most likely used for?
Marianna [84]

In the context of machine learning, an artificial neural network (ANN) exists most likely utilized for oil and gas exploration (Option c).

<h3>What is machine learning?</h3>
  • Machine learning (ML) guides to a kind of artificial intelligence based on computer algorithms capable of producing predictions without being programmed to do so.

  • Machine learning algorithms are used in various industries, including, among others, medical diagnostics, bioinformatics, image processing, modification of hygiene in production plans, etc.

  • Moreover, an artificial neural network (ANN) directs to a machine learning technique that receives inputs and then delivers explicit outputs regarding predefined activation functions.

  • This kind of computation network (artificial neural network) exists similar to neuronal biological networks carried out by neurons.

Hence, In the context of machine learning, an artificial neural network (ANN) exists most likely utilized for oil and gas exploration (Option c).

To learn more about Machine learning refer to:

brainly.com/question/25523571

#SPJ4

The complete question is,

In the context of machine learning, an artificial neural network (ANN) is most likely used for

a. Supplying explanations for solutions.

b. problems that require the use of if-then-else rules.

c. oil and gas exploration.

d. portfolio development and analysis.

7 0
1 year ago
Custom parameters 1, 2 and 3 provide the same end value for all keywords. true or false?
lesya [120]
Is a Microsoft Bing ads certification Exam question.
I think that the correct answer is:
False

Source and more info: <span>https://goo.gl/JUw7Bw</span>
3 0
2 years ago
Universal Containers has a sales team focused on renewals. They will use many of the same Opportunity fields as other teams, but
ololo11 [35]

Stage Selected Values in the Sales Processes

Explanation:

A system administrator is the individual responsible for maintaining, configuring, and managing computer systems efficiently, particularly multi-user machines like servers.

Defining opportunities which comprise the selling process appropriately is one of the main functions for any company using Sales-force to monitor the performance of its sales process.

The Opportunity Stage Sales-force model off - the-box standards also reflect not the vocabulary or process that sales people use in the company As a result, Sales-force companies frequently make three main mistakes when describing their selling terminology.

6 0
2 years ago
Other questions:
  • Which element of a business document provides additional information but is not a part of the body of the text?
    13·2 answers
  • Write a program reverse-order.cpp which asks the user to input two dates (earlier date then later date). The program should repo
    13·1 answer
  • • Open your Netbeans IDE and answer the following question
    5·1 answer
  • 2.13) A simple rule to estimate your ideal body weight is to allow 110 pounds for the first 5 feet of height and 5 pounds for ea
    15·1 answer
  • . What type of computer implementation does the following code represent? Load A,10 Load B,1:5 Add A,B STORE A, [20]
    5·1 answer
  • Explain the term information security?​
    9·1 answer
  • Five plus six is equal to?​
    10·2 answers
  • Instruction: Decide what the total marketing budget will be, and make a list of at least four things you will spend money on and
    15·1 answer
  • WHICH PROGRAMMING LANGUAGES ARE THE BEST AND COMPATIBLE FOR 3D PRINTERS?
    12·1 answer
  • Trojans depend on ________ to spread. A rootkits B self-replication C code injection D social engineering
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!