1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
GREYUIT [131]
3 years ago
10

A coffee shop is considering accepting orders and payments through their phone app and have decided to use public key encryption

to encrypt their customers' credit card information. Is this a secure form of payment?A. No, public key encryption allows the credit card information to be read by the public.B. No, the internet protocols are open standards and thus everything sent over the internet is sent "in the clear".C. Yes, public key encryption is built upon computationally hard problems that even powerful computers cannot easily solve.D. Yes, public key encryption is secure because it transmits credit card information in binary.
Computers and Technology
1 answer:
Alina [70]3 years ago
8 0

Answer:

C. Yes, public key encryption is built upon computationally hard problems that even powerful computers cannot easily solve

Explanation:

Public Key encryption makes use of a public key and a private key to secure data sent over the internet, such as credit card information. The public key is shared publicly, as seen with an SSL/TLS certificate. The data encrypted by the public key can only be decrypted by the private key found on the website server. Data encrypted by the private key can only be decrypted by a specific public key. This makes public key encryption complex and hard to solve, making it very secure .

You might be interested in
Tricia listed her assets and liabilities. Credit Card Bill Car Loan Bonds Piano Bank Account Bicycle Which are Tricia’s liabilit
DIA [1.3K]
<span>Her liabilities are her credit card bill and her car loan. These are things that she owes and has to pay off, so they are liabilities due to the fact that she owes for these items. Her bonds, piano, bank account, and bicycle are counted as assets.</span>
7 0
3 years ago
Read 2 more answers
Which sns gets its names from one of its unique features
Komok [63]

Answer:

no

Explanation:

3 0
3 years ago
What is the best operating system choice for a computer that only manages data?
Vanyuwa [196]

Answer:

Any form of Linux

Explanation:

The Linux OS is SUPER customizable, and it can still do everything that Windows or Mac OS does. Great Question.

8 0
3 years ago
Program _______ graphically present the detailed sequence of steps needed to solve a programming problem.
AlekseyPX

Program Pseudocode graphically present the detailed sequence of steps needed to solve a programming problem.

<h3>What are Pseudocode?</h3>

These are known to be a set of codes that a program has graphically depicted all of its sequence of steps that can be sued to handle a programming problem.

Note that Pseudocode is a form of artificial and man made informal language that is often used by programmers to create  algorithms.

Learn more about Program from

brainly.com/question/153827

#SPJ1

3 0
3 years ago
What level of access can a subapplication owner provide to another egrants user in the same organization who has been authorized
Oduvanchick [21]

The view/print privileges is the level of access can a subapplication owner provide to another egrants user in the same organization who has been authorized view/print access for other subapplications.

<h3>What is a Subapplicant?</h3>

Subapplicant is known to be a term that connote a State agency, or a community, that is said to be submitting a subapplication to the applicant and this is one that is often used as a source of aid under the FMA program.

Note that Upon grant award, the subapplicant is seen as the subrecipient and thus, The view/print privileges is the level of access can a subapplication owner provide to another egrants user in the same organization who has been authorized view/print access for other subapplications.

Learn more about subapplication from

brainly.com/question/14400492

#SPJ1

8 0
2 years ago
Other questions:
  • Where is the typical location of a touchpad inside of a laptop?
    14·1 answer
  • Have you ever tried to teach a class full of restless, active sixth-graders? I have. I taught sixth-grade students for 12 years.
    15·1 answer
  • The acronym LAH stands for
    14·2 answers
  • Big data refers to huge collections of data that are difficult to process, analyze, and manage using conventional data tools. It
    13·1 answer
  • Write a C++ program that produces a simple personalized adventure game called Lost Fortune about a band of explorers that finds
    12·1 answer
  • Which expression is equivalent to 3x + 3x + 3x?<br><br> From Performance Matters
    11·2 answers
  • Explain the iterative nature of the database requirements collection, definition, and visualization process.
    14·1 answer
  • Input a list of positive numbers, terminated by 0, into an array Numbers[]. Then display the array and the largest and smallest
    11·1 answer
  • Select the correct answer from each drop-down menu. The following diagram shows four resistors. What is the effective resistance
    9·1 answer
  • If David wishes to digitally sign the message that he is sending Mike, what key would he use to create the digital signature
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!