1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
GREYUIT [131]
3 years ago
10

A coffee shop is considering accepting orders and payments through their phone app and have decided to use public key encryption

to encrypt their customers' credit card information. Is this a secure form of payment?A. No, public key encryption allows the credit card information to be read by the public.B. No, the internet protocols are open standards and thus everything sent over the internet is sent "in the clear".C. Yes, public key encryption is built upon computationally hard problems that even powerful computers cannot easily solve.D. Yes, public key encryption is secure because it transmits credit card information in binary.
Computers and Technology
1 answer:
Alina [70]3 years ago
8 0

Answer:

C. Yes, public key encryption is built upon computationally hard problems that even powerful computers cannot easily solve

Explanation:

Public Key encryption makes use of a public key and a private key to secure data sent over the internet, such as credit card information. The public key is shared publicly, as seen with an SSL/TLS certificate. The data encrypted by the public key can only be decrypted by the private key found on the website server. Data encrypted by the private key can only be decrypted by a specific public key. This makes public key encryption complex and hard to solve, making it very secure .

You might be interested in
What is the binary answer to the binary number 100 added to the binary number 11?
olasank [31]
I will use 0b to refer to binary numbers: ex: 0b1 = 1, 0b10 = 2

0b100 = 4 and 0b11 = 3

4+3 = 7

convert 7 to binary and you get 111.

Hope this helps, and May the Force Be With You!
<span>-Jabba</span>

6 0
3 years ago
Read 2 more answers
What are the steps to open the Custom AutoFilter dialog box?
uranmaximum [27]

Answer:

data, sort and filter, text filters

Explanation:

ed 2020

7 0
3 years ago
Read 2 more answers
Which of the following is a requirement for the Safety Data Sheet (SDS)?​
Natasha_Volkova [10]
What are the options?
4 0
3 years ago
How will I go about conducting the investigation on fake news
Leno4ka [110]

Answer:

You can begin your report, and write about CNN, BBC, or any other liberal news network.

Explanation:

5 0
3 years ago
Your personality is that of everyone else
lubasha [3.4K]

hmmmmm but is it really

5 0
4 years ago
Read 2 more answers
Other questions:
  • If a storm is 7.5 kilometers away, how much time is expected between observations of lightning and thunder? Round your answer to
    10·1 answer
  • A network engineer is examining a configuration implemented by a new intern who attached an ip phone to a switch port and config
    9·1 answer
  • When you declare a string data type, you are actually creating an object from the?
    5·1 answer
  • When a rectangular region is defined using an appropriate style, which value matches the specified edge of the clipping region t
    7·1 answer
  • 1. Define a C++ function with the name evaluateBook. The function receives as one argument the name of the file to be processed
    13·1 answer
  • How do the principles behind the Agile Manifesto suggest approaching architecture?A. Architecture emergesB. Architecture is not
    10·1 answer
  • What is the most efficient way to prevent the spelling checker from repeatedly flagging a correctly spelled name in all of your
    5·1 answer
  • Swapping two input integers if they are not the same. (use switch-case
    10·1 answer
  • You should always be afraid to use the internet<br><br> True or false?
    11·1 answer
  • Which function category is not in Excel 2016?
    12·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!