1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
aniked [119]
3 years ago
8

Asymmetric key encryption combined with the information provided by a. certificate authority allows unique identification of the

user of encrypted data. b.the provider of encrypted data. c. both the user and the provider of encrypted data. d. either the user or the provider of encrypted data.
Computers and Technology
1 answer:
Nesterboy [21]3 years ago
5 0

Answer:

c. both the user and the provider of encrypted data.

Explanation:

In assymetric key encryption, you will need the public key of the sender to decode the information along with your private key to decode the encrypted information. if you don't have any of the keys, you won't be able to read the information. You must have both in order to read the information sent.

You might be interested in
PowerPoint is great for brainstorming and producing creative pieces because it
leonid [27]
Your answer is most likely A. Use media
7 0
3 years ago
Read 2 more answers
A student is helping a friend with a home computer that can no longer access the Internet. Upon investigation, the student disco
Alexxandr [17]

Answer:

Due to unreachable DHCP server

Explanation:

As we know that Dynamic Host Configuration Protocol, in short  DHCP is the network protocol which is used to central and automatic management of IP address with in the network.

So due to unreachable DHCP server a student could not able to connect with the internet.When the network connection break it means that DHCP server is offline.

So the answer is Due to unreachable DHCP server .

8 0
3 years ago
(Business: check ISBN-10) An ISBN-10 (International Standard Book Number) consists of 10 digits: d1d2d3d4d5d6d7d8d9d10. The last
Aneli [31]

Answer:

 The solution code is written in Python 3

  1. digits = input("Enter 9 digits: ")
  2. multiplier = 1
  3. total = 0
  4. for x in digits:
  5.    total += int(x) * multiplier  
  6.    multiplier += 1
  7. checksum = total % 11  
  8. if(checksum == 10):
  9.    print(digits + "X")
  10. else:
  11.    print(digits + str(checksum))

Explanation:

Firstly, use input function to get user input for 9 digits (Line 1)

Next we can use a for-loop to estimate the summation (d1 * 1 + d2 * 2 + d3 * 3 + d4 * 4 + d5 * 5+ d6 * 6 + d7 * 7 + d8 * 8 + d9 * 9) ( Line 6-8)

Then only apply % operator to get the remainder of total and get the checksum (Line 10)

Next create if and else statement to print the digits string joined with X if checksum is 10 else join digits string with checksum value (Line 12 -15)

7 0
4 years ago
Define the method object inc_num_kids() for PersonInfo. inc_num_kids increments the member data num_kids.Sample output for the g
topjm [15]

Answer:

class PersonInfo:

   def __init__(self):

       self.num_kids = 0

   def inc_num_kids(self):

       self.num_kids += 1

person1 = PersonInfo()

print('Kids:', person1.num_kids)

person1.inc_num_kids()

print('New baby, kids now:', person1.num_kids)

Explanation:

Line 1 of the code, we define the class PersonInfo. Line 3 of the code is the function that will increment the member data num_kids.

4 0
4 years ago
Name three actions you should take if you believe you’ve been victimized by crimeware or online fraud
allochka39001 [22]

Try restating system software and delete anything that may have caused the online fraud then remove all credit cards and info on the device. Tell the authorities and get a new device and email with a software protector. When doing this DO NOT DO WHAT YOU ORIGINALLY DID TO GET VICTIMIZED AND (DON'T TRY TO SIGN INTO YOUR PREVIOUS EMAIL ON A NEW DEVICE)  

4 0
4 years ago
Read 2 more answers
Other questions:
  • you are a software engineering consultant and have been called in by the vice president of finance of a corporation that manufac
    10·1 answer
  • How do you think computers have helped to improve documentation, support and services within the healthcare industry.
    7·1 answer
  • Joshua wants to be a lawyer. He found the following table on the Bureau of Labor Statistics’ website to find out about the emplo
    13·2 answers
  • The icons to insert footnotes and endnotes in a document are located in the _____ tab.
    8·1 answer
  • Question 10 of 10
    6·1 answer
  • Which option is used to apply formatting to multiple objects on a single slide while still maintaining the ability to manage the
    14·2 answers
  • What is an IP address and where I can find the IP address for my computer?
    14·1 answer
  • You are a desktop administrator for nutex corporation. Your organization uses ethernet cable to connect network resources. A use
    14·1 answer
  • Explain information technology ?
    10·1 answer
  • _____ are fields that are used to personalize a mail merge document
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!