1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
tatuchka [14]
2 years ago
9

Encrypting text allows us to encrypt and decrypt the text using a special key.

Computers and Technology
1 answer:
makvit [3.9K]2 years ago
6 0

Answer: True

Explanation:

The statement that encrypting text allows us to encrypt and decrypt the text using a special key is true. Encryption means when plaintext are translated into things that looks random.

For us to encrypt or decrypt a particular text, we have to enter the text first into input field after which the password will be pressed Then, the encryption process will be started.

You might be interested in
Recall that the name of a transport-layer packet is segment and that the name of a link-layer packet is frame. What is the name
AlladinOne [14]

Answer:

A network-layer packet is a data gram. A router forwards a packet based on the packet's IP (layer 3) address. A link-layer switch forwards a packet based on the packet's MAC (layer 2) address.

Explanation:

When the end system receives the unstructured bit stream from the physical wire, each layer removes the header information applicable to it until the application receives the data.

1. An application, such as an email program, creates data that will be sent by an end user, such as an email message. The Application layer places a header (encapsulation) field that contains information such as screen size and fonts, and passes the data to the Presentation layer.

2. The Presentation layer places layer 6 header information. For example, the text in the message might be converted to ASCII. The Presentation layer will then pass the new data to the Session layer (layer 5).

3. The Session layer follows the same process by adding layer 5 header information, such as information that the Session layer will manage the data flow, and passes this data to the Transport layer (layer 4).

4. The Transport layer places layer 4 information, such as an acknowledgement that the segment was received in the header, and passes it to the Network layer (layer 3).

5. The Network layer places layer 3 header information, such as the source and destination address so the Network layer can determine the best delivery path for the packets, and passes this data to the Data Link layer (layer 2).

6. The Data Link layer places layer 2 header and trailer information, such as a Frame Check Sequence (FCS) to ensure that the information is not corrupt, and passes this new data to the Physical layer (layer 1) for transmission across the media.

7. The bit stream is then transmitted as ones and zeros on the Physical layer. It is at this point that the Physical layer ensures bit synchronisation. Bit synchronisation will ensure the end user data is assembled in the correct order it was sent.

8. Steps 1 through 7 occur in reverse order on the destination device. Device B collects the raw bits from the physical wire and passes them up the

Data Link layer. The Data Link layer removes the headers and trailers and passes the remaining information to the Network layer and so forth until data is received by the Application layer. Eventually, Device B will receive an email notification displaying a message to indicate that a new email message has been received.

5 0
3 years ago
W t f is a ground fault circuit interrupter?
LuckyWell [14K]

lol you are awesome but to break it down for you a circuit inter-putter is is a plug in the is on the floor i have 2 of these in my home. i hope this helps you Mr. w t fer lol hahahaha XD

8 0
3 years ago
Read 2 more answers
In the RGB color model, what do numbers 0-255 represent
Ludmilka [50]

In the RGB (Red, Green, Blue) color model, the numbers 0-255 represent  the intensities of each color beam .Each number represents an intensity value is on a scale of 0 to 255, It can be also written in hexadecimal form, from 00 to FF.

RGB values are encoded as 8-bit integers, which range from 0 to 255.

3 0
3 years ago
When encoding information, which of the five senses has been shown to be more durable and last longer in memory?
Llana [10]
<span>Olfactory memory tends to be the most durable. Surprisingly, smells tend to be the most strongly related with memories. This has been shown by people being able to associate smells with events for longer periods than any other sensory input. Most other inputs only stay in memory for a period of milliseconds, up to 2-4 seconds at the most.</span>
8 0
3 years ago
The table shows the number of points Ramon has earned on science quizzes. Quiz 16 points Quiz 2 9 points Quiz 3 1 point Quiz 4 9
kotykmax [81]

Answer:9

Explanation:d.9

6 0
2 years ago
Other questions:
  • What year did bill gates form traf-o-data?
    8·1 answer
  • Explain in detail what it means to synchronize computers and mobile devices. include at least two strategies for keeping your fi
    7·1 answer
  • Suppose you wanted to run a web server or ftp server from your home. what type of ip address would you want?​
    6·1 answer
  • What executable programs have names that are just one character long, and what do they do??
    5·1 answer
  • which of these describe raw data?check all of the boxes that apply A) what a person buys B) where a person lives C) data that ha
    9·1 answer
  • Why are new versions of applications packages released often ​
    9·1 answer
  • What is the shortcut to select all text?
    12·2 answers
  • Prompts what is a row?
    7·1 answer
  • A ___ is an online collaborative event that may include such features as chat, slideshows, and PowerPoint presentations.
    8·1 answer
  • Types of computer viruses<br>​
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!