1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
MAXImum [283]
3 years ago
13

Okay im spamming but help me again please

Computers and Technology
1 answer:
Alika [10]3 years ago
3 0

Answer: for 5 its b and for 6 i may be wrong but i think its also b

Explanation:

You might be interested in
Just answer the 2 questions. THX
pogonyaev

Answer:

A then D

Explanation:

3 0
3 years ago
Suppose Alice uses the RSA system with a very large modulus n for which the factorization cannot be found in a reasonable amount
Yuliya22 [10]

Answer:

Encryption method security:-

  • Encryption method representing each alphabetic character as an integer between 0 and 25.
  • Now, apply RSA algorithm for each integer is not an efficient secure encryption method.

Explanation:

  • Let consider alphabetic characters set {A, B... Z} .
  • Each alphabetic character forms a set of message block values M={0,1,2...,25).
  • From encryption method the corresponding cipher text block value C = {0e mod n,1e mod n, 2e mod n,..., 25e mod n}.
  • Then, compute the cipher text with knowledge of Bob's public key;
  • If the public key is generated, then possibility to decrypt the cipher text to plain text.
  • The generated public key is easily calculated by everyone and security is lost.
  • Therefore, the encryption method is not secure.

Encryption method is not secure, Most efficient attack against this method:-

  • Now, compute the encryption message with the function Me mod n for all the possible values of M.
  • This is the most efficient attack against the scheme in encryption method.
  • Then, create a look-up table with cipher text as an index to the corresponding plain text as a value for appropriate location in the table.
4 0
3 years ago
The internet has made worldwide access to networks and information simpler and faster. This access comes with both benefits and
igor_vitrenko [27]
Information will be easier to access, but that info has a slight chance of being downright wrong. Also, very technical info will be unavailable.
6 0
3 years ago
What is the name of the GIMP window that contains a set of icons to select the tool you want to use?
mel-nik [20]

Answer

Tool Box

Explanation

A tool box is a window that contains  icons and buttons that are tools in the program. The tools helps in quick access to common operations GIMP is image manipulation program. Ii is normally a free and open source graphic editor which is used for the purposes of drawing , editing doing many more specialized tasks.To show the tool box in GIMP you just need to use edit preferences then select toolbox to enable or disable .


8 0
4 years ago
An intruder with malicious intent breaks into an office and steals a hard drive
kakasveta [241]

Answer: data security

Explanation:

The company's authentication protocols and data encryption measures denotes data security.

Data security simply means protecting unauthorized people from having access to a particular data. This is done to prevent unauthorized access of important information or to prevent fraud. Some of the data security measures include data encryption, tokenization, hashing, etc.

4 0
3 years ago
Other questions:
  • All employees of E.C. Hoxy are required to pass through a gate and present their photo identification cards to the guard before
    10·1 answer
  • Peter works on a huge database of numerical figures in a worksheet ranging from cell A1 to cell I50. He has to print the workshe
    15·2 answers
  • The underline format will underline what?
    9·2 answers
  • c) Do hardware purchases or salaries for IT workers demand a greater share of the total cost of the ownership of the IT infrastr
    9·2 answers
  • Briefly describe the software quality dilemma in your own words
    13·1 answer
  • How much memory will be occupied by black and white image​
    8·2 answers
  • I make a budget of my 1st Gamer PC its good?
    9·1 answer
  • Why isn't image display working on wacom tablet.
    8·1 answer
  • Identify the correctly constructed ALTER TABLE statement to add a UNIQUE constraint to the column customer_number with the const
    15·1 answer
  • The designers of a database typically begin by developing a​ __________ to construct a logical representation of the database be
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!