1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lubov Fominskaja [6]
3 years ago
13

Your computer system is a participant in an asymmetric cryptography system. You've crafted a message to be sent to another user.

Before transmission, you hash the message and then encrypt the hash using your private key. You then attach this encrypted hash to your message as a digital signature before sending it to the other user. Which protection does the private key-signing activity of this process provide
Computers and Technology
1 answer:
Anna [14]3 years ago
5 0

Answer: integrity

Explanation:

Hashing refers to changing a string of characters into shorter fixed-length value which represents the original string. Hashing is faster to find items in the database.

Based on the information given, the protection that he private key-signing activity of this process provide us integrity.

You might be interested in
A client is attempting to access a secure Wi-Fi network. To be successful, which action would the client need to do
solniwko [45]
Secure WiFi used passwords, so the client needs to have the correct password
7 0
2 years ago
Describe the difference between an interest and a skill.
ikadub [295]

Answer: an interest is something you like or have a small passion for whereas a skill is something you have the ability to do

Explanation:

7 0
3 years ago
Read 2 more answers
Some data files should be totally hidden from view, while others should have ____ so users can view, but not change, the data.
Eddi Din [679]

Answer:

read-only properties.

Explanation:

Only the read only properties can view but cannot change the data.The user don't have access to the no access properties, full-access properties can read and modify the data.The write only properties can only modify the data.So to only view the data the data should have read only properties.

4 0
4 years ago
You are an administrator for the contoso corporation. you have several hyper-v hosts that connect to a central storage area netw
Kruka [31]

1. Power off the virtual machine.  

2. Right-click the virtual machine, and click Migrate.

3. Click Change datastore.

4. Click Next, and select a datastore that is not the same as the current datastore.

5. From the dropdown, select the Thin Provision virtual disk format.

6. Click Next, then Finish. You can monitor the progress of the conversion in the Tasks and Events view in vCenter Server.

6 0
3 years ago
Which of the following occupations is most likley to require working night and weekend shifts
Alex787 [66]
I can’t see the picture. I would love to help but I am unable to see the post you posted
4 0
3 years ago
Other questions:
  • In the context of social bookmarking, what does tagging allow you to do?
    5·2 answers
  • Describe one type of technology that is useful in producing images from space.
    9·1 answer
  • When he takes a picture, Simon freezes an action without blurring it, to show movement. Which type of photographer is he?
    9·2 answers
  • Hey I don’t have a question I’m just testing something on this app
    6·2 answers
  • What is required for sitting with your seatbelt on while driving?
    7·1 answer
  • Give several reasons why Python is such a great programming language. Explain how Python is related to flowcharts. (students mak
    9·1 answer
  • You're in the process of downloading some email messages when your antivirus software displays an alert. you assume the software
    9·1 answer
  • Input a list of positive numbers, terminated by 0, into an array Numbers[]. Then display the array and the largest and smallest
    11·1 answer
  • Who tryna play fortnite?
    5·2 answers
  • What concerns exist wherever personally identifiable information is collected stored in digital form or otherwise
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!