1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
GREYUIT [131]
3 years ago
10

A coffee shop is considering accepting orders and payments through their phone app and have decided to use public key encryption

to encrypt their customers' credit card information. Is this a secure form of payment?A. No, public key encryption allows the credit card information to be read by the public.B. No, the internet protocols are open standards and thus everything sent over the internet is sent "in the clear".C. Yes, public key encryption is built upon computationally hard problems that even powerful computers cannot easily solve.D. Yes, public key encryption is secure because it transmits credit card information in binary.
Computers and Technology
1 answer:
Alina [70]3 years ago
8 0

Answer:

C. Yes, public key encryption is built upon computationally hard problems that even powerful computers cannot easily solve

Explanation:

Public Key encryption makes use of a public key and a private key to secure data sent over the internet, such as credit card information. The public key is shared publicly, as seen with an SSL/TLS certificate. The data encrypted by the public key can only be decrypted by the private key found on the website server. Data encrypted by the private key can only be decrypted by a specific public key. This makes public key encryption complex and hard to solve, making it very secure .

You might be interested in
Traditionally, remote administrative access on routers was configured using Telnet on TCP port 23. However, Telnet was developed
FinnZ [79.3K]

<u>Explanation</u>:

It is an all-too-often used technology today in connecting several computers together via a network.

Routing simple terms means the action of selecting the path taken by the traffic of data in a network of computers. The routing systems involve the use of both wireless and cable based architectures. Some common example of routing systems includes:

  1. Dynamic Routing
  2. Static routing
  3. Default Routing
5 0
3 years ago
Select the correct answer from each drop-down menu.
Dmitry_Shevchenko [17]

Answer:

Suzanne needs a blog

Explanation:

Because she wants to use a digital media tool that acts as a journal and facilitates discussion, Suzanne would need a blog for this.

A blog is a platform where people can meet and have discussions on the internet sometimes in a diary-like format.

Suzanne would need software like WordPress for her blog.

8 0
4 years ago
In access, field names cannot contain digits. true or false.
Sedaia [141]
The answer is false.
8 0
3 years ago
Which of the following is an input device on a toaster?
iragen [17]
The electrical outlet
3 0
3 years ago
Read 2 more answers
Match the item to the type.
I am Lyosha [343]

Answer:

a. hardware - 3. motherboard

b. software - 2. Microsoft Word

c. input device - 4. mouse

d. operating system - 1. windows

7 0
3 years ago
Read 2 more answers
Other questions:
  • These systems consist of interlinked knowledge resources, databases, human experts, and artificial knowledge agents that collect
    9·1 answer
  • (Please select 2)
    14·1 answer
  • Which of the following is a correct statement about writing down passwords on a ""cheat sheet?""
    7·1 answer
  • Why is spyware more dangerous than adware
    5·1 answer
  • to minimize wrist injury switch frequently among touch gestures the keyboard and the mouse true or false
    15·1 answer
  • &lt;
    6·1 answer
  • When solving a problem in a group situation, which of the following traits should be demonstrated?
    8·1 answer
  • Discuss why it is important to know the history of social media​
    10·1 answer
  • How many parts make up a web address? One To Three​
    6·1 answer
  • Explain the relationship between one’s point of view and understanding spoken text
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!