1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kotykmax [81]
3 years ago
9

Your organization uses a type of cryptography that provides good security but uses smaller key sizes and utilizes logarithms tha

t are calculated against a finite field. Which type of cryptography does your organization use?
Computers and Technology
1 answer:
Marianna [84]3 years ago
5 0

Answer:

Elliptic curve

Explanation:

Elliptical curve cryptography known with the acronym ECC is a known to be a technique used for public key encryption based on elliptic curve theory that can be utilized for the creation of faster, smaller, but highly efficient cryptographic keys. Elliptical curve cryptography utilizes logarithms that are calculated against a finite field.

You might be interested in
In programming languages, ____ is used as a mnemonic representation for the program instruction’s memory address.
Alecsey [184]

Answer:

Assembly language

Explanation:

Assembly language writes instructions in human letters. Every machine language instruction has a corresponding assembly language instruction that means exactly the same thing. Assembly language uses a symbolic form of a program which are capable of:

- readable by human beings (+/-)

- constants, addresses, and names of symbolic instructions

- arithmetic during assembly - calculations of addresses, constants

- synthetic instructions (not supported by our assembler)

- expansion of macroinstructions (not supported by our

assembler)

- assembly instructions (pseudo-instructions)

• memory allocation

• memory initialization

• conditional assembly (not supported by our assembler)

3 0
3 years ago
How can you check data on devices connected through an iot network?
vampirchik [111]

<em>Internet of Things(IoT)</em> which could be described as a group of interconnected systems or objects which are able to communicate, transmit and exchange data using <em>smart technology</em> and sensors. Data can be checked and monitored on these devices using Dashboards.

  • Dashboards provides a graphical representation of information about interconnected IoT objects or devices. They are produced using data collected from interconnected objects.

  • Since all objects are interconnected, devices use data which are are stored in storage or memory locations. These data are then used to prepare information displayed on dashboards.

Therefore, dashboards provides an interface to view data information about IoT connected devices.

Learn more :brainly.com/question/24958568

6 0
3 years ago
Read 2 more answers
is a security design principle to direct the selection of control layers for an organization's computing enclave to ensure its r
Rina8888 [55]

Answer:

Defense in Depth (DiD).

Explanation:

Cyber security can be defined as preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.

Defense in Depth (DiD) can be defined as a concept or framework in cyber security that typically involves the process of layering multiple defensive mechanisms and security control throughout an information technology (IT) system, so as to prevent data theft or an unauthorized access to user data.

Basically, this cyber security technique is designed such that when a layer of the defensive mechanism fails, another security layer step in to mitigate and prevent the attack. Thus, it causes redundancy when an attacker exploits a vulnerability in a system, a breach of security or when one of the security layers fail.

3 0
3 years ago
Which type of software is the most similar to database software?\
kykrilka [37]
The answer is graphics
5 0
3 years ago
What term describes a wireless network topology in which access points work as peer devices on the same network?
kumpel [21]
Mesh WLAN wireless mesh network WMN describes a wireless network topology in  access points work as peer devices on the same network.
<span />
7 0
3 years ago
Other questions:
  • a certain battery can supply 6 J of energy to every coulomb of charge moving through a circuit. if the circuit consists of two i
    13·1 answer
  • Suppose in a class of 100 students, there is a homework due every week. The professor wants to encourage students to hand in the
    8·1 answer
  • Preesure is drived quantity? why​
    15·2 answers
  • Suppose a classmate constructed an electric motor with a solid commutator.that is, the commutator has no split. This solid commu
    9·1 answer
  • What lever has resistance between the axis (fulcrum) and the force (effort)?
    10·2 answers
  • You work on a team whose job is to understand the most sought after toys for the holiday season. A teammate of yours has built a
    11·1 answer
  • A great way to obtain Hands-On training in a real quick environment is to complete a ??
    12·1 answer
  • A student is having trouble finding enough time in his busy schedule to work on his school science project. He has a demanding s
    5·2 answers
  • You wrote a program to find the factorial of a number. In mathematics, the factorial operation is used for positive integers and
    14·2 answers
  • What is the difference between functional and non-functional testing
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!