1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
svetlana [45]
3 years ago
7

Select three examples of cryptographs. Security tokens Shared-key Malware Firewalls Message authentication code Public-key

Computers and Technology
2 answers:
Tema [17]3 years ago
8 0

Answer:

(1) secret key, (2) public key, and (3) hash functions. Pick an algorithm for any one of these types (e.g., DES, AES, RSA, MD5) and describe how it works and where it is applied (For example SSL uses 3DES or DES) for message encryption.

Explanation:

svp [43]3 years ago
6 0

well i only have one awnser a message authentication codes.

You might be interested in
In the MOV instruction both operands i.e. source andthe destination cannot be
nekit [7.7K]

Answer:

an immediate.

Explanation:

It is because of the instruction encoding and decoding.Intel which make these instructions decided not include instructions which provide no real advantage. MOV segment register is one of them because segment register need not to be changed very often.This saves the space in instruction encoding.

3 0
4 years ago
Read 2 more answers
If I use the command right(90), which way will Tracy turn?<br> If correct I mark brainlist
Kaylis [27]

Answer: Right

Explanation: If you use the Command Right (90°), it makes sense that Tracy turns right 90°...

5 0
2 years ago
Identify and explain the three tiers of web-based applications.
prisoha [69]

In the case of three-tier architecture, the tiers are as follows: Presentation tier (also known as the user interface or the client application) Business logic tier (also known as the application server) Data storage tier (also known as the database server)

This was on google i take no credit for this work

Btw I don´t know if this is what u want

7 0
3 years ago
What are the 6 external parts of a computer
Sedbober [7]

External computer components connect to the motherboard through a series of ports on the computer case. Many components have their own dedicated port connections, such as those to connect audio equipment or the computer monitor. Others may share a single type of connector, such as the USB, that connects everything from keyboards and mice to game pads and external hard drives. there


8 0
4 years ago
List five applications field of a computer?​
True [87]

list five applications field of a computer?

answer= <em> </em><em>home</em><em> </em><em>,</em><em> </em><em>school</em><em>,</em><em> </em><em>h</em><em>o</em><em>spital</em><em>,</em><em> </em><em>bank</em><em>,</em><em> </em><em>super</em><em> </em><em>markets</em><em>,</em><em> </em><em>etc</em><em>.</em><em>.</em><em>.</em><em>.</em>

5 0
3 years ago
Other questions:
  • Which situation can result in positive population growth?
    14·1 answer
  • Of the two basic methods of data entry, keyboards use keystrokes to enter data and instructions; what is the nonkeyboard method
    8·1 answer
  • What is one of the most helpful things about having a role model?
    10·2 answers
  • A binary message consisting of four bits was sent to you by a friend. The message was supposed to be ABAB. Unfortunately, your f
    8·1 answer
  • Prewritten, commercially available sets of software programs that eliminate the need for a firm to write its own software progra
    7·1 answer
  • Which component of the windows desktop allows you to retrieve files that have recently been deleted?
    11·1 answer
  • One key feature of malware is that it:
    13·1 answer
  • Lab 8-1: Working with Boot Loader and Runlevels what is the root password
    9·1 answer
  • The technologist has recorded the red cell morphology as macrocytic. which mcv value would confirm this observation?
    7·1 answer
  • What is the name of the method generated when you double-click a button named btnprocess in the form designer?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!