1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
UNO [17]
3 years ago
13

¿Qué algoritmos de encriptación utilizan una clave para cifrar los datos y una clave diferente para descifrarlos?

Computers and Technology
1 answer:
Irina18 [472]3 years ago
8 0

Answer:

Asimétrica

Explanation:

Los algoritmos de encriptación sirven para que solo el destinariario y receptor de los datos logren acceder a la información, es decir que inmediatamente que es enviada la información, solo puede ser legible para quien tenga un código de acceso, al mismo quien envía necesita una clave diferente para enviar lo datos. es un algoritmo asimétrico porqué el emisor y el receptor usan claves diferentes de encriptación.

You might be interested in
Assume that the classes listed in the Java Quick Reference have been imported where appropriate.
Georgia [21]

rcre2nvijrnv

u1bcihdebc

nn

8 0
4 years ago
_____ technology is a broadband technology that can use the wires of a local telephone network.
Alenkasestr [34]
DSL  - DSL stands for Digital Subscriber Line. This technology came after the Dial Up technology for connecting to the Internet. The big disadvantage of Dial-up technology was that when you were talking on the phone, you could not use the Internet and vice-versa. However, although DSL technology used the regular telephone line , it worked on frequencies different from the telephone. So you could use the phone and the Internet at the same time.
5 0
4 years ago
With,user receive recommendations for items that are similar in type to items they already like.
Dennis_Churaev [7]

Answer:

Collaborative filtering

Explanation:

This is one out of five on the Recommender system apart from most popular items, Association and Market Basket based Analysis, Content-based analysis, self and hybrid analysis where we use both content-based and collaborative based approach together. And the Recommender system is a very important topic in Data science. For this question, remember that Collaborative filtering focuses on user and various other user's choices which are mathematically alike to concerned users, and which we find with the study of a large data set. Thus, we can predict from our above study that what are going to be likes of concerned users, and at the item level, whether that item will be liked by the concerned user or not. And this is prediction, and we use this approach in Machine learning these days. For this question, and as mentioned in question the requirements, answer is Collaborative filtering.

6 0
3 years ago
The process of data gathering is generally referred to as:
Snowcat [4.5K]
He answer is analytics.  The process of data gathering is generally referred to as analytics.   
7 0
3 years ago
What happens when a string doesn’t include the separator that’s specified in the parameter of the split() method?
Brilliant_brown [7]

Answer:

Nothing

Explanation:

If a seperator value is provided as an argument within the split() method and the string does not include that value then the string will remain the same and will not be split. If no value is provided as an argument within the split() method, then the string that the method is being applied to will automatically be split in every space character (" ") that exists within it. This is the default value of split() when no argument is passed to it.

5 0
3 years ago
Other questions:
  • True or false words spelling and grammar check is always %100
    7·2 answers
  • 535 = d +4<br> Whats d?????????????????????<br> &lt;33 thnx babes.
    8·2 answers
  • 4.
    13·1 answer
  • i have a at&amp;t router and a 1000mbs Ethernet cable connecting from that to my net gear r7000 that can push +1000mbs. the cabl
    14·1 answer
  • What is the main role of LDAP?
    14·1 answer
  • All sensitive media on a laptop should be encrypted.
    14·1 answer
  • Use the drop-down menus to answer questions about the options in the Window group. Which command allows a user to view presentat
    6·2 answers
  • A folder is a collection of related of data is true or false​
    10·2 answers
  • Can we use a data type as a condition in C++?
    14·1 answer
  • What are three ways to protect yourself from identity theft when using your smartphone or computer?.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!