1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
9966 [12]
2 years ago
5

Which of the following is NOT a reason to use cryptography?

Computers and Technology
2 answers:
Margaret [11]2 years ago
8 0
Posting photos on a public social media website
Mars2501 [29]2 years ago
5 0

Cryptography is not a reason to use when posting photos on a public social media website.

Cryptography is the use of certain techniques that help protect important and personal information from being accessed by other parties. This technological practice or method allows a person to send sensitive or personal information over the internet without risking any "leak" of information.

  • Cryptography literally means "hidden writing", which is what the method is all about.
  • It presents a safe and secure way of sending or passing information, even personal or sensitive ones.
  • This technological method enables businesses and other companies as well as individuals to procure and send information without fearing for any loss of their information.
  • Cryptography is mainly used in the military, secret operations, businesses, or even in maintaining one's passwords while using social media platforms or submitting a password on a website.
  • One reason to not use it is when posting photos on social media websites as the website is to be used by the web world and may/can be accessed by everyone around the world.

Cryptography not only allows a person to maintain certain privacy and security but also help the smooth functioning of businesses and other national security works. Thus, cryptography is the "security" of individuals in the 'internet world'.

Learn more about cryptography here:

brainly.com/question/88001

You might be interested in
After creating a webpage with html code, what do you need to do so that others can access it on the internet?.
allochka39001 [22]

Answer:

People can figure out a way to reach one another without the use of traveling!

Explanation:

5 0
2 years ago
What does the "configure dhcp options for proxy dhcp" option do?
ZanzabumX [31]
You should select the configure DHCP options for proxy DHCP option if the local DHCP server is a Microsoft DHCP server, if you select this option the DHCP server is automatically configured to forward the PXE requests to the WDS server. If the local DHCP server is not a Microsoft DHCP server, you have to configure the DHCP server manually to forward the request to the WDS server. 
5 0
3 years ago
How to do this? ICT Excel there's a screenshot attached
gtnhenbr [62]

I cannot see the attachment

8 0
3 years ago
A hacker scanning a web server is likely to be identified by the target's web a. Because of the FBI's Carnivore scanning program
eduard

Answer:

C

Through the target's web server's log.

Explanation:

A web server is a server software or a hardware that is fully dedicated to the running of that software. It satisfies a user's request on the www that is the World Wide Web. A web server can, contain just one or more websites.

It processes incoming network requests over HTTP and several other related protocols.

It also stores the webpages the user have visited in the past. Tracking the target's web server to know what enter or left can expose the hacker that is scanning a user's web server.

5 0
2 years ago
20 POINTS!!! I NEED HELPP
Cloud [144]

Answer:

Apple

Explanation:

5 0
3 years ago
Read 2 more answers
Other questions:
  • Examples of algorithm
    5·1 answer
  • Is it just me or is brainly not working right now? I am trying to add friends and it won't let me!
    5·2 answers
  • Communications technology and the Internet can be used to reduce the time and costs involved in disseminating financial statemen
    14·1 answer
  • What conversion factor should be used to convert from meters to Gigameters?
    7·1 answer
  • After a suspected identity fraud case has been resolved, you should:
    10·2 answers
  • The road is closed a head
    9·1 answer
  • Why does the peot use a simular pharase at the beggining of each stanza
    8·1 answer
  • 6.What does transgenic mean?​
    12·2 answers
  • The full meaning of UNIVAC and ENIAC​
    5·2 answers
  • A eclipse occurs at a full moon when the moon passes between earth and the sun
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!