1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
GREYUIT [131]
3 years ago
10

A coffee shop is considering accepting orders and payments through their phone app and have decided to use public key encryption

to encrypt their customers' credit card information. Is this a secure form of payment?A. No, public key encryption allows the credit card information to be read by the public.B. No, the internet protocols are open standards and thus everything sent over the internet is sent "in the clear".C. Yes, public key encryption is built upon computationally hard problems that even powerful computers cannot easily solve.D. Yes, public key encryption is secure because it transmits credit card information in binary.
Computers and Technology
1 answer:
Alina [70]3 years ago
8 0

Answer:

C. Yes, public key encryption is built upon computationally hard problems that even powerful computers cannot easily solve

Explanation:

Public Key encryption makes use of a public key and a private key to secure data sent over the internet, such as credit card information. The public key is shared publicly, as seen with an SSL/TLS certificate. The data encrypted by the public key can only be decrypted by the private key found on the website server. Data encrypted by the private key can only be decrypted by a specific public key. This makes public key encryption complex and hard to solve, making it very secure .

You might be interested in
Write keyboard shortcut to insert footnote and endnote​
loris [4]

Answer:

Alt + Ctrl + F to insert a footnote.

Alt + Ctrl + D to insert an endnote.

Correct me, if I am wrong :)

Have a great day!

Thanks!

5 0
2 years ago
In your own words, describe the advantages and disadvantages of the auto-negotiation protocol used in Ethernet communications.
dexar [7]

Answer:

 Auto-negotiation protocol is the modern technology in the networking. This protocol allow the ethernet equipment for automate different instillation steps. This type of protocol use by interconnecting various electronic devices for negotiating the speed of the link.  

Advantages:

  •  The auto negotiation protocol features used to maximize the throughput of data link layer.
  •  This protocol are basically useful in the local area network (LAN), with multiple capability of connections.
  •  The auto negotiation protocol extremely useful in twisted pair which are based on ethernet.

Disadvantages:

  •   This type of protocol are not fixed data links and not used as backbone of the networks.  
  •  Duplex mismatch occur then, it cause significant loss in the packets.

7 0
3 years ago
List 3 characteristics of the ideal encryption scheme
JulsSmile [24]
Three characteristics of an ideal encrytion scheme are:
1. The encryption sheme should be strong: the algorithm is imprevious to direct attack and attempts are derived.
2. The encryption scheme should create unique ciphertext from the same plaintext for each key permutation, among other traits.
3. It should take at least millions of years to break ideal encryption scheme, based on mathematical predictions.
6 0
3 years ago
Read 2 more answers
Imagine how the situation could be handled. Come up with as many ideas as possible: There's no one "right" answer! Then, highlig
Veseljchak [2.6K]

Answer:

there is no passage

Explanation:

6 0
3 years ago
A search engine is giving you too many sites that are not relevant to your topic, how cell phones change culture. Placing quotes
Pie

Answer:

All of the above.

Explanation:

Regards: Your Friendly Study Co-Pilot!

5 0
3 years ago
Read 2 more answers
Other questions:
  • I need this ASAP anyone pleas help me i have to do this by tonight
    10·1 answer
  • Is regular Facebook use healthy? Why or why not?
    10·2 answers
  • You are configuring a switch that has three hosts attached to FastEthernet 0/2 through 0/4. All three hosts are part of a public
    10·1 answer
  • If there is a circuit that is being used 36 CCS then how much of that circuit is being used in Erlang?
    8·1 answer
  • Give an O(log m + log n)-time algorithm that takes two sorted lists of sizes m and n, respectively, as input and returns the ith
    7·1 answer
  • Refer to the following code segment. You may assume that array arr1 contains elements arr1[0],arr[1],...,arr[N-1], where N = arr
    8·1 answer
  • Suppose you are given a data set consisting of nominal attributes, such as color, which takes values such as red, blue, green et
    9·1 answer
  • Research and discuss the LAMP (Linux, Apache, MySQL, and PHP) architecture. What is the role of each layer of this software stac
    14·1 answer
  • Is downloading like installing?
    13·1 answer
  • In the __________ Standard, chemical manufacturers, importers, and distributors are required to provide hazard information by wa
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!