1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vanyuwa [196]
3 years ago
13

In PKI, the CA periodically distributes a(n) _________ to all users that identifies all revoked certificates.

Computers and Technology
1 answer:
Trava [24]3 years ago
4 0

Answer:

" CRL (certificate revocation list)" is the appropriate answer.

Explanation:

  • A collection of such subscriber bases containing accreditation or certification status combined with the validation, revocation, or outdated certification within each final customer is known as CRL.
  • Only certain subscribing workstations with a certain underlying cause authentication system should have been duplicated.
You might be interested in
Which of the following is NOT a characteristic developed by New Journalism?
krok68 [10]
Flashy page layouts
7 0
3 years ago
When a primary key combines two or more fields, it is called a ____ key?
Tanya [424]
<span>When a primary key combines two or more fields, it is called a ____ key
the answer is Constructed key</span>
6 0
3 years ago
The binary search algorithm cannot be used to search an array that is not sorted does twice as much work as sequential search on
maks197457 [2]

Answer:

Option A => cannot be used to search an array that is not sorted

Explanation:

The reason for choosing ‘option a’ is that, the actual working mechanism of binary search is to sort the array first then choose a middle element and compare the given search element with the help of middle element. Let us deeply understand how this sorting and choosing middle element does the work of search.

So this middle element is the key pointer which tells the system that the matching element might be present either to the list of values which are less than middle element or it would be present in the right side / greater than middle element. So, it would search only in the list satisfying the middle element. So it is always necessary to sort the element.

4 0
3 years ago
This technology is used to produce high-quality documents that look good on the computer screen and in print. wiki presentation
Virty [35]

Answer:

The Answer is Desktop Publishing.

Explanation:

Desktop publishing software is one of the tools used by graphic designers as well as non-designers.

It helps in designing visual displays such as brochures, posters, visiting cards, web pages, and desktop printing.

Example:

Corel Draw

Corel Ventura

5 0
3 years ago
1. PGP encryption can be performed from the command line as well. What is the PGP command line syntax to encrypt the my-message.
bekas [8.4K]

Answer:

1. From the command prompt, type:

pgp --encrypt "my-message.txt" --recipient "Sean" --output "secret-message.txt.gpg"

2. Press Enter.

Explanation:

From the command line, the above command is entered and Enter is pressed.

The command start with pgp, then it has different options:

--encrypt: this specifies the input file to be encrypted

--recipient: this specifies the specific user to which the file is been encrypted

--output: this specifies the name to which the output (encrypted file) is saved.

8 0
3 years ago
Other questions:
  • “What does it mean when we “rework” copyrighted material?”
    15·2 answers
  • How can improving one’s reasoning skills also improve one’s performance on the job?
    12·2 answers
  • Write a program that lets the user play the game of Rock, Paper, Scissors against the computer. The program should work as follo
    5·1 answer
  • Explain the components of Information System?​
    13·1 answer
  • Select the correct statement(s) regarding partial mesh networks.
    5·1 answer
  • The force required to slide an object is equal to _____.
    13·1 answer
  • 2. The internet offers a great source of information; however, how are
    9·1 answer
  • What operating system are you using? On most computers, you can answer this question by right-clicking on the "My Computer" icon
    6·2 answers
  • Which of the following tiny computer apps is designed to be useful but could cause more harm than good?
    7·1 answer
  • In what document does the program manager (pm) address the demilitarization and disposal requirements?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!