1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kotykmax [81]
3 years ago
9

Your organization uses a type of cryptography that provides good security but uses smaller key sizes and utilizes logarithms tha

t are calculated against a finite field. Which type of cryptography does your organization use?
Computers and Technology
1 answer:
Marianna [84]3 years ago
5 0

Answer:

Elliptic curve

Explanation:

Elliptical curve cryptography known with the acronym ECC is a known to be a technique used for public key encryption based on elliptic curve theory that can be utilized for the creation of faster, smaller, but highly efficient cryptographic keys. Elliptical curve cryptography utilizes logarithms that are calculated against a finite field.

You might be interested in
When does the following while-loop stop running?
8090 [49]

The loop never stops running because the value of var is always 1.

5 0
3 years ago
Weekly salary and assumes work-hours-per-week limit of 40. Overtime refers to hours worked per week in excess of some weekly lim
hodyreva [135]

Answer:

import java.util.Scanner;

public class WeeklySalary {

   public static void main(String[] args) {

       Scanner in = new Scanner(System.in);

       System.out.println("Enter Hourly wage");

       double hourlyWage = in.nextDouble();

       System.out.println("Enter total hours worked in the week");

       int hoursWorked = in.nextInt();

       int overtime = hoursWorked - 40;

       double weeklyWage = 40*hourlyWage;

       System.out.println("Total Over Time Hours is: "+overtime);

       double overTimeWage = overtime*(hourlyWage*1.5);

       System.out.println("Wage for full time: "+ weeklyWage);

       System.out.println("Wage for over time: "+ overTimeWage);

   }

}

Explanation:

  • Using Java programming language
  • Import the Scanner class to receive user input
  • prompt user for hourly wage rate, receive and save in a variable
  • Prompt user for total hours worked for the week receive and save in a variable
  • calculate overtime hours by subtracting 4 from total hours worked in the week
  • Calculate weekly wage by multiplying hourly rate by 40
  • Calculate overtime by multiplying overtime hours by (hourlyWage*1.5).
  • See attached sample run of the code

8 0
3 years ago
If you were to broadcast a live feed of the event, which type of editing would you choose?
Naily [24]
I would use instagram live
8 0
3 years ago
Iceland was formed by _____.
levacccp [35]
<span>Iceland was formed by "Volcanic Activity"

Hope this helps!</span>
6 0
3 years ago
Read 2 more answers
Communication among office computers is based on a protocol that uses CRC-32 for error detection. A series of 100 identical test
Fiesta28 [93]
I think it is the CRC-32 for error detection
4 0
3 years ago
Other questions:
  • Suppose sum and num are int variables, and the input is 18 25 61 6 -1
    11·2 answers
  • You are a police officer trying to crack a case. You want to check whether an important file is in the evidence room. Files have
    5·2 answers
  • Which of the following statements is false?a.Unethical behavior is always illegal.b.Ethical decisions are usually influenced by
    12·1 answer
  • You have been asked to create a Community leveraging Out-of-the-box login, logout, self-registration, and error pages. Would you
    5·1 answer
  • Your mom wants to start using some type of cloud storage so that she can access
    15·1 answer
  • What does px mean in css ?
    13·1 answer
  • (Game Design) Creating and manipulating data structures is one of the primary functions of a development environment.
    12·2 answers
  • What is the purpose of a router
    13·2 answers
  • Memory of your familiar old e-mail password may block the recall of your new password. This illustrates
    8·1 answer
  • A co-worker is called away for a short errand and leave the clinical PC logged onto the Confidential Information System. You nee
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!