1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Dmitry_Shevchenko [17]
3 years ago
10

The foundation of secure communication on the internet replies on asymmetric encryption, with the use of Public and Private keys

for encryption and decryption.
true or false
Computers and Technology
1 answer:
sergiy2304 [10]3 years ago
3 0
Answer: True

Hope this helps :)
You might be interested in
You want to create a hyperlink within your document to the sec web site. which type of link do you create?
snow_lady [41]
An Existing file or web page. 
4 0
3 years ago
A coffee shop is considering accepting orders and payments through their phone app and have decided to use public key encryption
Charra [1.4K]

Answer: Yes

Explanation:

Public key encryption is the encryption technique that is used for private keys and public keys for securing the system.Public key is used for encryption and private key is for decryption.Public keys can only open content of the system

  • According to the question, public key encryption is secure for coffee shop customer payment process as they are stored on digital certificates in long form for verifying digital signature and encrypting information.Its computation is difficult to crack through power computer access.  
  • Other options is incorrect as encryption is not a problem for payment procedures. Thus, the correct option is yes ,public key encryption is secure method for coffee shop customers .
8 0
3 years ago
Gaming related
Blababa [14]

Answer:

yes affects your K/D

Explanation:

winner winner chicken dinner

please mark me please brainliest or mark thanks

5 0
2 years ago
Matt goes to an Internet café and tries to access his emails. The email client asks Matt to enter his email address along with t
Radda [10]

Answer:

acknowledging

Explanation:

it has to be d

6 0
3 years ago
Zbn-ivfh-ovm is the meet code enter there lol
RSB [31]

Answer:

bet

Explanation:

8 0
2 years ago
Other questions:
  • Write c program to check character is alphabate or not?​
    15·1 answer
  • You want to know what directories in your account hold C files. You can use the command:______.
    9·1 answer
  • Team A found 342 errors during the software engineering process prior to release. Team B found 184 errors. What additional measu
    12·1 answer
  • You are adding new wires in your building for some new offices. The building has a false ceiling that holds the lights and provi
    8·1 answer
  • What two methods can be used to access and modify an existing program that is running on an iot device in cisco packet tracer? (
    6·1 answer
  • In which job role would a course in 3D modeling help with professional career prospects?
    9·2 answers
  • You and your friend who lives far away want to fairly and randomly select which of the two of you will travel to the other’s hom
    6·1 answer
  • How do you fix this!!!!
    5·1 answer
  • What is phishing?
    14·1 answer
  • A. In I/O interation between OS and devices, describe how hybrid mechanism works?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!