1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
9966 [12]
3 years ago
5

Which of the following is NOT a reason to use cryptography?

Computers and Technology
2 answers:
Margaret [11]3 years ago
8 0
Posting photos on a public social media website
Mars2501 [29]3 years ago
5 0

Cryptography is not a reason to use when posting photos on a public social media website.

Cryptography is the use of certain techniques that help protect important and personal information from being accessed by other parties. This technological practice or method allows a person to send sensitive or personal information over the internet without risking any "leak" of information.

  • Cryptography literally means "hidden writing", which is what the method is all about.
  • It presents a safe and secure way of sending or passing information, even personal or sensitive ones.
  • This technological method enables businesses and other companies as well as individuals to procure and send information without fearing for any loss of their information.
  • Cryptography is mainly used in the military, secret operations, businesses, or even in maintaining one's passwords while using social media platforms or submitting a password on a website.
  • One reason to not use it is when posting photos on social media websites as the website is to be used by the web world and may/can be accessed by everyone around the world.

Cryptography not only allows a person to maintain certain privacy and security but also help the smooth functioning of businesses and other national security works. Thus, cryptography is the "security" of individuals in the 'internet world'.

Learn more about cryptography here:

brainly.com/question/88001

You might be interested in
A network technician is assisting the security team with some traffic captures. The security team wants to capture all traffic o
Katyanochek1 [597]

Answer:

Option C i.e., Hub.

Explanation:

When network technician helps the support team with processing a few of the data. The support team needs to occupy both congestion between the router and the core switch over an individual subnet. To use it, the members must make sure there's only an individual collision as well as they broadcast IP address between both the router and the switch through which the congestion is received.

So, the technician installs the Hub to meet the following goal because It captures all the traffic on an individual subnet between them.

4 0
4 years ago
How do you think computers have helped to improve documentation, support and services within the healthcare industry.
AfilCa [17]
Before the use of technology such as computers, information was documented through papers separated in folders. This was a very long and complicated process as people would have to find information by hand, sorting through countless documents. Now, it is much easier and neater to keep information. It can be as easy as digitally searching for someone's name and the computer will sort through countless documents, finding the one you need almost instantly. It is also much less wasteful and safe, as before computers, the use of paper was the only way to permanently keep information, also making documents vulnerable to being lost or stolen.
4 0
3 years ago
Which option is considered a part of the document that is used to collect specific and predefined information?
zzz [600]

I pretty sure it's a form but don't count me on it.

4 0
3 years ago
Write a short essay on the importance of information and communication technology (ICT) in the AFN industry. Add suitable exampl
AURORKA [14]

Answer:

computer

Explanation:

is an ICT device that help and makes things or work easy

6 0
3 years ago
The operating systems, and utility programs that perform system
Phantasy [73]

Answer:

System softwares.

Explanation:

A software can be defined as a set of executable instructions (codes) or collection of data that is used typically to instruct a computer how to perform a specific task and to solve a particular problem.

Basically, softwares are categorized into two (2) main categories and these are;

I. Utility software.

II. System software.

The operating systems, and utility programs that perform system maintenance and protection tasks such as error correction and backup are called system softwares.

An operating system is a system software pre-installed on a computing device to manage or control software application, computer hardware and user processes.

This ultimately implies that, an operating system acts as an interface or intermediary between the computer end user and the hardware portion of the computer system (computer hardware) in the processing and execution of instructions.

Some examples of an operating system on computers are QNX, Linux, OpenVMS, MacOS, Microsoft windows, IBM, Solaris, VM etc.

On the other hand, a utility software can be defined as a software application or program designed to add more functionality to a computer system, as well as to improve its performance efficiently. Some examples of commonly used utility tools in computer are file and folder backup tools, file management, antivirus, hard disk diagnostics, registry cleaner, network performance monitor, screensavers etc.

4 0
3 years ago
Other questions:
  • If you use a surrogate key, you must ensure that the candidate key of the entity in question performs properly through the use o
    5·1 answer
  • Need answers for 11&12. Due today. Thanks.
    14·1 answer
  • To gain one pound of fat, how many extra calories would you need to consume?
    12·1 answer
  • A ________ is hardware or software that acts as a filter to prevent unwanted packets from entering a network.
    9·2 answers
  • Controlled intersections use some form of which of the following:
    7·1 answer
  • What question should you ask yourself to determine if a story is newsworthy
    11·2 answers
  • A network security analyst received an alert about a potential malware threat on a user’s computer. What can the analyst review
    12·1 answer
  • In an experiment in which participants sat in an office and then were asked to remember what they saw in the office, participant
    6·1 answer
  • Add the following method to the Point class: public double distance(Point other) Returns the distance between the current Point
    12·1 answer
  • The equals method of the Object class returns true only if the two objects being compared:_________
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!