1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
rodikova [14]
3 years ago
12

What technology has a function of using trusted third-party protocols to issue credentials that are accepted as an authoritative

identity?
Computers and Technology
1 answer:
jarptica [38.1K]3 years ago
5 0

Answer: PKI certificates

Explanation: PKI is known as the public key infrastructure which is commonly used for the encryption of the data and also for the data signing. They have the ability to assign the keys pair.

PKI certificates are in the form of strings of alpha-numeric running for a mathematical functions. They use the third party protocols for the execution and they are widely accepted by the authoritative identity.

You might be interested in
Each row in a database is a set of unique information called a(n)
blondinia [14]

A row, which is also called a tuple.

4 0
3 years ago
Read 2 more answers
Wright a 3 paragraph 5 sentences per graph story bout computers or the internet
boyakko [2]

Ah yes, technology.

Firsly, let's start at the begining. Because we can't have internet without computers. Think of it from the old quote, "Which came first? The chicken or the egg?"

Computers, or the very first programmable one was created by German Konrad Zuse. A man with too much free time, invented a computer in his parents' living room. And yes, it was considered  to be the very first electromechanical binary programmable PC. He called it the "Z1". There's actually no right answer to this to be quite frank, considering the many different classifications you'd call a computer back then.

Why was the computer invented? Why, where would we be without it? Certainly not here (hence brainly and you asking this question). Computers were created for the sole purpose of a repetitive calculation to perform more quick and accurately information.

5 0
3 years ago
WILL MARK BRAINLIEST THIS IS ALL MY POINTS AND I ALREADY ASKED THIS QUESTION AND IF YOU ANSWER IT AGAING YOU WILL GET MORE POINT
dezoksy [38]

Answer:

A <u>patent</u> is a type of legal protection for which person can apply to protect an invention or a discovery.

Explanation:

Invention  will be the solution of some technical problem or discovery recognizing something first time that is already exist , that can be unique from other solutions. These innovations and discovery are protected to secure the interest of the inventor. A legal term is used to protect the invention or discovery is known as patent.

Whenever some one invent or discover a new thing he will secure his interest through Patent protect.

8 0
3 years ago
A feature left behind by system designers or maintenance staff or that is placed by a hacker once they have compromised a system
AfilCa [17]

Answer:

Is a Back door

Explanation:

A back door is known as a way to gain access to a system by avoiding necessary authentication or encryption. This put in place by either the system's designers or hackers once the system is compromised.

5 0
3 years ago
What key should you press and hold to select and open multiple files at one time? Enter Alt Control Esc
Yuliya22 [10]

Press and hold down the CTRL key while you drag the file to another folder. Press and hold down CTRL+SHIFT while you drag a file to the desktop or a folder.

3 0
3 years ago
Read 2 more answers
Other questions:
  • Write a program that determines the price of a movie ticket (similar to the one in the chapter). The program asks for the custom
    9·1 answer
  • If you want a user to enter exactly 20 values which loop would be the best to use
    12·1 answer
  • Which of the following is least likely checked by the comprehensive component monitor?
    7·1 answer
  • Write a program that reads a stream of integers from a file and writes only the positive numbers to a second file. The user shou
    5·1 answer
  • What is one thing the ADDIE model does NOT account for?
    14·1 answer
  • On which of the following pointing devices can you control the pointer by sliding your fingertip?
    11·1 answer
  • Page Up and Page Down keys fall under the ? keys category.
    14·2 answers
  • Free coins who is octane and dont say u dont know because i will do the same to u
    13·2 answers
  • Kyle has a notebook for each of his 5 classes. He puts 6 stickers on each notebook. There are 10 stickers on each sheet. How man
    11·2 answers
  • Integrated circuits incorporate many transistors and electronic circuits on a single tiny silicon chip, allowing ____ to be even
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!