1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ArbitrLikvidat [17]
3 years ago
6

Public-key cryptography (a form of asymmetric cryptography) is an encryption method that's widely used because: 1) it is computa

tionally infeasible to computer the private key based on the public key, 2) it's easier to share one public key than billions of private keys, 3) it's much tough to crack asymmetric encryption than symmetric, 4) it's more secure because the private keys do not even need to be transmitted or revealed to anyone.
A. 1 only
B. 2 only
C. 3 and 4 only
D. All 1-4 are correct
Computers and Technology
1 answer:
rosijanka [135]3 years ago
7 0

Answer:

C.

Explanation:

You might be interested in
Hi, I have several computer questions. These refer to the history of the internet. I would like to know if everything we look fo
MaRussiya [10]

<u>Hi dear user! </u>

<u>Hope my answer helps you and solve your queries. </u>

First of all,

ISP which is an acronym of Internet Service Provider, keeps the track of all the activities their users perform through their network.

For eg :-

You have a connection of Airtel, whatever you will access through your Airtel network will always be tracked by your ISP which is Airtel. If you delete your search/download history from your phone/laptop, still it can be seen by Airtel, you cannot delete from there end. Even if you access anything in incognito mode, then your browser does not stores your data but your ISP still can see what all you accessed in incognito mode.

Now coming to your next question,

If you delete your data from your phone or laptop, it is still somewhere saved in the hard drive of that device. The file is deleted from the device but it's hard drive still have that file, and anyone can access to that data by using a certain software but for that, the person will also need your hard drive. There are certain softwares like Disk Drill which is used to recover the hard drive's data.

Hope your queries are resolved !

7 0
3 years ago
Choose the term that describes each step of the cycle.
stich3 [128]

Answer:

The answer to this question is given below in the explanation section.

Explanation:

This question is about to tell the best and suitable terms for the given descriptions in the question.

As we know that a computer program is based on sets of instructions. The CPU carries out the processing using the fetch decode and execute cycle.

It is responsible for implementing a sequence of instructions called a computer program that takes input, processes them, and outputs the result based on processing.

A CPU mainly has three components such as control unit, Arithmetic logic unit,  and register.

The control unit controls all parts of the computer system. It manages the four basic operations of the Fetch Execute Cycle such as Fetch, Decode, Executes, and Storage.

So the correct terms of this question are:

Fetch: Gets next instruction

Decode: interprets the instruction

Execute: Carries out instruction.

Store: Save results of instruction.

5 0
2 years ago
A palindrome is a string that reads the same from left to right and from right to left. Design an algorithm to find the minimum
stepladder [879]

Answer:

Explanation:

The following code is written in Python. It is a recursive function that tests the first and last character of the word and keeps checking to see if each change would create the palindrome. Finally, printing out the minimum number needed to create the palindrome.

import sys

def numOfSwitches(word, start, end):

   if (start > end):

       return sys.maxsize

   if (start == end):

       return 0

   if (start == end - 1):

       if (word[start] == word[end]):

           return 0

       else:

           return 1

   if (word[start] == word[end]):

       return numOfSwitches(word, start + 1, end - 1)

   else:

       return (min(numOfSwitches(word, start, end - 1),

                   numOfSwitches(word, start + 1, end)) + 1)

word = input("Enter a Word: ")

start = 0

end = len(word)-1

print("Number of switches required for palindrome: " + str(numOfSwitches(word, start, end)))

3 0
2 years ago
Submit your newsletter that includes the following: two or three columns a title at least three graphics, but not more than six
BigorU [14]

God Is Good He Will Always Help You He Is Good And Always Good!!

If God Is For Us Who Can Be Against us?? Romans 8:31

7 0
2 years ago
Read 2 more answers
For which of the following is a bulleted list more appropriate than a numbered list?
Vedmedyk [2.9K]
THE ANSWER IS A!!!!!!!!!!!!!!!!!!!
5 0
3 years ago
Other questions:
  • Which program or security application prevents access between a private and trusted network, and other untrusted networks?
    8·2 answers
  • "Simon Says" is a memory game where "Simon" outputs a sequence of 10 characters (R, G, B, Y) and the user must repeat the sequen
    12·1 answer
  • Stefan is finalizing his presentation by adding media files and preparing it for distribution. Stefan knows that saving a presen
    13·1 answer
  • ______________ is only one of the marketing mix tools that acompany uses to achieve its marketing objectives.
    7·1 answer
  • The exercise instructions here are long -- please read them all carefully. If you see an internal scrollbar to the right of thes
    15·1 answer
  • What should you do before you share your information on the Internet? A. Ask a trusted adult to make sure it is safe. B. Check t
    13·1 answer
  • Which can be used to decode a Unicode character encoding into text?
    13·1 answer
  • Pls help me!!!!!!!!!!!!!!!!!!!
    11·2 answers
  • You do not really know that you have a hand. Here is why. Imagine the possibility in which you are only a handless brain floatin
    14·1 answer
  • You ping a host on the internet to check for connectivity. Your ping times out, and you get no response. What is most likely the
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!