1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nataliya [291]
3 years ago
12

SOMEONE PLS HELP ME

Computers and Technology
1 answer:
stealth61 [152]3 years ago
7 0
What i don’t get this i’m sorry what
You might be interested in
Suppose a MATV/SMATV (Satellite Master Antenna Television) firm has to start it's operation in the metropolitan area of a countr
Nata [24]
Cdizvwjcuabcusyfbwhcyeiixhw. jai
8 0
4 years ago
How can you encrypt and decrypt a message in cryptography
ser-zykov [4K]
There are two main types of encryption - <span>symmetric and asymmetric. 

Using symmetric encryption, you use a single secret key that is used to both encrypt and decrypt the data. This form of encryption has been used way before computers! Without this key it is very hard to decrypt a message. However, the issue with this is that if you want to send an encrypted message, you also have to send a key to them, and </span>if your somebody unintended intercepts the key, they can read the message.

What's the solution? Asymmetric cryptography or public key encryption. Asymmetric cryptography uses encryption that splits the key into two smaller keys. One of the keys is public and one is kept private. A good metaphor for understanding this is the public key is the lock, and the private key is the key. You can encrypt a message to send to somebody with their public key, locking it, which they can then decrypt, unlock, with their private key. And vice versa. So with this kind of encryption it's very difficult to decrypt a message for anybody but the owner as it's much harder to steal when it doesn't need to leave their computer, but easy to encrypt messages to send to them

5 0
3 years ago
TRUE OR FALSE: Bomb threat checklists are extremely valuable and should be made available at all workstations.
Sergio039 [100]

Answer:

True

Explanation:

"Bomb threat checklists are extremely valuable and should be made available at all workstations. If your organization does not have a bomb threat checklist, print the sample for future reference. Keep a copy of the checklist at your workstation at all times."

8 0
3 years ago
Where must data be in
Talja [164]

Answer:

C Random access memory

8 0
3 years ago
What type of role does the group leader have? Informal negative positive Formal
lyudmila [28]
Just as leaders have been long studied as a part of group communication research, so too have group member roles. Group roles are more dynamic than leadership roles in that a role can be formal or informal and played by more than one group member
6 0
3 years ago
Other questions:
  • Assessing opportunity cost involves...
    6·1 answer
  • The Leader Motive Profile (LMP) includes a: a. high need for power. b. low need for achievement. c. moderate need for power. d.
    6·1 answer
  • Which of the following is the largest unit of information?
    15·2 answers
  • Which is true about POP3 and IMAP for incoming email?
    10·1 answer
  • What is the definition of a digital signal?
    14·1 answer
  • The objective is to write the program that can help you process the database. Your program should be able to (1) display the dat
    14·1 answer
  • _____ involves storing data and running applications outside the company’s firewall. answer grid computing parallel computing cl
    11·1 answer
  • Which 4 elements are commonly contained in a master page?
    11·1 answer
  • Goals of the project objectives
    6·1 answer
  • Select all the correct answers<br> Which TWO statements describe the functions of wireless media?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!