1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
GREYUIT [131]
3 years ago
10

A coffee shop is considering accepting orders and payments through their phone app and have decided to use public key encryption

to encrypt their customers' credit card information. Is this a secure form of payment?A. No, public key encryption allows the credit card information to be read by the public.B. No, the internet protocols are open standards and thus everything sent over the internet is sent "in the clear".C. Yes, public key encryption is built upon computationally hard problems that even powerful computers cannot easily solve.D. Yes, public key encryption is secure because it transmits credit card information in binary.
Computers and Technology
1 answer:
Alina [70]3 years ago
8 0

Answer:

C. Yes, public key encryption is built upon computationally hard problems that even powerful computers cannot easily solve

Explanation:

Public Key encryption makes use of a public key and a private key to secure data sent over the internet, such as credit card information. The public key is shared publicly, as seen with an SSL/TLS certificate. The data encrypted by the public key can only be decrypted by the private key found on the website server. Data encrypted by the private key can only be decrypted by a specific public key. This makes public key encryption complex and hard to solve, making it very secure .

You might be interested in
Which of the following mountain ranges stretches from Alabama to Canada?
Vikki [24]
The Appalachian Mountains
4 0
3 years ago
A telecom company wants to extend their horizontal cables over a distance of 510 meters. Which cable should they use?
Volgvan
They should use fiber cable because it is faster and more reliable
8 0
4 years ago
WILL GIVE BRAINLIEST!!!!!!!!!
sukhopar [10]

Answer:

True

Explanation:

7 0
3 years ago
Are Microsoft an Apple more secure from malicious action because of their closed-source approach?
omeli [17]

Yes Microsoft and Apple used the closed-source approach to better secure from malware and make to make their operating systems more user friendly.

7 0
3 years ago
Plz I need help 30 points
Kisachek [45]

hey mate your ans

in the picture

8 0
3 years ago
Other questions:
  • Ben is writing web page content on a newly launched gaming gadget. He has to use hyperlinks to help visitors navigate to web pag
    11·1 answer
  • In your own words, describe the structure and function of both the stack and queue data structure and discuss how they are diffe
    6·1 answer
  • What is the name of the feature that can be enabled on slower-speed WAN links to prevent a large data transfer from affecting th
    10·1 answer
  • Crash proof cars... do you have any idea on how to improve this idea
    13·2 answers
  • The OSI model is currently the most widely implemented network model used to develop and build networks of any size, including t
    8·1 answer
  • What is included on the HP PC Hardware Diagnostics 3-in-1 USB Key that allows you to recover systems that cannot boot?
    14·1 answer
  • An example of an asset is:<br><br> A. Time<br> B. Money<br> C. A Car <br> D. All of the above
    5·2 answers
  • What does a file association specify?
    10·2 answers
  • Cloud architects have been largely replaced by ScrumMasters.<br><br> True<br><br> False
    15·2 answers
  • Pa sagot po TLE-10<br>need den po Ng solution thank you​
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!