1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
svetlana [45]
3 years ago
7

Select three examples of cryptographs. Security tokens Shared-key Malware Firewalls Message authentication code Public-key

Computers and Technology
2 answers:
Tema [17]3 years ago
8 0

Answer:

(1) secret key, (2) public key, and (3) hash functions. Pick an algorithm for any one of these types (e.g., DES, AES, RSA, MD5) and describe how it works and where it is applied (For example SSL uses 3DES or DES) for message encryption.

Explanation:

svp [43]3 years ago
6 0

well i only have one awnser a message authentication codes.

You might be interested in
Becca is working on a program that will store data. The program will need quick access to data and data persistence is not impor
tester [92]

Answer:

A developer wants to take existing code written by another person and add some features specific to their needs.

Explanation:

pls Mark as Brain list

3 0
3 years ago
A website that allows anyone with access to add new material and edit existing materials is referred to as a​ _________. A. data
nataly862011 [7]

Answer:

C. wiki

Explanation:

5 0
4 years ago
Read 2 more answers
What is an effective technique for searching the web?
Arte-miy333 [17]
Google.com, Bing, or Dark Web engines.
7 0
4 years ago
Which term below refers to the overall design intended to convey an idea or feeling that is appealing to the site's target audie
xenn [34]

Answer:

What are the terms

Explanation:

6 0
4 years ago
In the U.S. a standard mortgage requires a down payment of
Doss [256]
Atleast a minimum of 3%. Brainliest? 
6 0
4 years ago
Other questions:
  • 1. What are the two things the base of a number system tells you? After describing these two things, illustrate each with exampl
    6·1 answer
  • Using the slice operator, print your first, then last name.2. Print the length of your first name.3. Assume you have two variabl
    6·1 answer
  • True or false? any webb app can be accessed and run on any computing
    12·1 answer
  • Why is operating system pivotal in teaching and learning
    11·1 answer
  • 3. Which one of the following statements is true for spell checkers?
    11·1 answer
  • In the ADT graph the methid addVertex has efficiency
    15·1 answer
  • The primary benefit to the use of overlays in animation is that animators are able to
    12·2 answers
  • Consider an unpipelined or single-stage processor design like the one discussed in slide 6 of lecture 17. At the start of a cycl
    10·1 answer
  • What are three key characteristics of an OS process?
    11·1 answer
  • My brainly has broke- XD
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!