1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sergio039 [100]
3 years ago
13

Bob received a message from Alice which she signed using a digital signature. Which key does Bob use to verify the signature?Gro

up of answer choicesAlice's private keyBob's public keyAlice's public keyBob's private key
Computers and Technology
1 answer:
alexira [117]3 years ago
7 0

Answer:

Alice's public key

Explanation:A Public key is a key that can be used for verifying digital signatures generated using a corresponding private key which must have been sent to the user by the owner of the digital signature.

Public keys are made available to everyone required and they made up of long random numbers.

A digital signature signed with a person's private key can only be verified using the person's private key.

You might be interested in
Which of the following is a recommended approach for data backup? Select one: a. Allow employees to take copies of vital data ho
frosja888 [35]

Answer:d)Use online databases to update and backup the data.

Explanation: Data backup is the creation of copy of the data to be stored in the secondary memory.This data is utilized when the data is lost or deleted from original positional and thus gets restored . Database are used for the updating the backed-up data on online mode.

Other options are incorrect because it does not creates copies for the offices members to take home, no data storage is created in following organization and does not store data in external disk.Thus, the correct option is option(d).

6 0
3 years ago
The library Wi-Fi kiosk requires a symmetric connection to the Internet. Which WAN technology would probably be the least expens
kenny6666 [7]

Answer:

The answer is IP-sec.

Explanation:

0.75 miles of range is a low distance for a WAN (Wide Area Network) so a point-to-point WAN tehcnology such as IP-sec or SD-WAN can be preferred. But the least expensive option would be choosing IP-sec as specified in the question.

I hope this answer helps.

6 0
3 years ago
Lesser-known ideas and interpretations of common knowledge need to be documented. true or false.
Tresset [83]
False. As it is common knowledge, it is unnecessary for it to be documented.
7 0
3 years ago
Define las 3 fases de la economia y explica en que espacios se localizan​
navik [9.2K]
Can you like translate it to English so I can understand lol
7 0
3 years ago
A recently promoted employee at your company has called you because they attempted to log in to their computer several times wit
oksano4ka [1.4K]

Answer:

The user's account is blocked due to several unsuccessful login attempts.

Explanation:

Any device having a password security has a property of blocking the account or device in use after noticing several unsuccessful attempts of login.

So as a precautionary measure when the software notices such activity it blocks the access to that account so that any intruder might not be able to enter the account premises.

Same is the case with the employee who was trying to access his own account but due the expired password he made several attempts but couldn't log in. The software took it as an intruder and blocked the account.

The employee after requesting for password reset again tried to login but the account was blocked so he could not be able to access it again.

7 0
3 years ago
Other questions:
  • Write a function wordcount() that takes the name of a text file as input and prints the number of occurrences of every word in t
    12·1 answer
  • What are the elements of an autobiographical narrative similar to those of a short story?
    7·1 answer
  • Define the following terms:<br><br> - pigment<br> - vehicle<br> - binder<br><br> plz help
    12·2 answers
  • It will gain you more knowledge, intensify your soft skills, strong work ethics and grow your network. What is it?​
    12·2 answers
  • For the description below, develop an E-R diagram:
    9·1 answer
  • Downloading files is safe for most types of files except Select one: a. documents. b. pictures. c. executable files. d. music fi
    7·1 answer
  • Why are medical related professions and human resources important? ​
    8·1 answer
  • Assume a computer uses pipelining of 9 stages. Each stage demands 3 clock cycles to finish its task. How many clock cycles are n
    9·1 answer
  • Designing a video game takes tons of creativity. What inspires your personal creativity and ideas for video games? Explain and g
    15·1 answer
  • python. create a program that asks the user to input their first name and their favorite number. Then the program should output
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!