1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
AlexFokin [52]
3 years ago
5

The IT director asks you to set up a system that will encrypt credit card data. She wants you to use the most secure symmetric a

lgorithm with the least amount of CPU usage. Which of the following algorithms should you select?a. SHA-1
b. AES
c. RSA
d. 3DES
Computers and Technology
1 answer:
bonufazy [111]3 years ago
8 0

The IT director asks you to set up a system that will encrypt credit card data. She wants you to use the most secure symmetric algorithm with the least amount of CPU usage. The algorithms that we should select is <u>AES Advanced Encryption Standard</u>

Explanation:

  • <u>The AES is also referred to as Advanced Encryption Standard, it is also known as  Rijndael</u>
  • <u>AES is a specification standard that is used for the  encryption of electronic data .</u>
  • <u>It was established by the U.S. National Institute of Standards and Technology in the year  2001</u>

<u />

  • <u>AES is a symmetric block cipher which encrypts the plain text and converts it into cipher text which consist of random characters.Only the individual having the special key can decrypt it .</u>

<u />

  • <u> AES uses a type of symmetric key encryption, which indicates the  use of one secret key to cipher and decipher information.</u>
  • <u>The Advanced Encryption Standard is used by the  U.S. government to protect classified information and is used to encrypt sensitive information</u>

<u />

<u>AES comes in 128-bit, 192-bit, and 256-bit variants and AES 256 provide you the highest level of security</u>

<u></u>

You might be interested in
In this lab you will learn about the concept of Normal Forms for refining your database design. You will then apply the normaliz
noname [10]

Answer:

I don't know

Explanation:

is about knowing how to make use of the refinery

7 0
3 years ago
P2p networks are most commonly used in home networks. <br> a. True <br> b. False
postnew [5]
<span>The statement that P2P networks are most commonly used in home networks is true. 
</span>P2P stands for peer-to-peer communication network. It is an example of local administration. <span> Two or more PCs share files and access to devices such as printers without requiring a separate server computer or server software with P2P type of network.</span>
6 0
4 years ago
Write a MIPS program to continuously generate the following series of integers: 1, 2, 3, 6, 9, 18, 27, 54, 81, and so on. Use st
Pachacha [2.7K]

Answer:

Explanation:

Here is a working solution in MIPS

.data

space: .asciiz ", "

.text

li $t1, 1       #Start at 1

li $t2, 1       #Store last value

li $t4, 1000    #terminate at 1000

li $t7, 2       #For division (divide by 2)

loop:

li $v0, 1

add $a0, $t1, $zero #print $t1

syscall

div $t1, $t7      #divide $t1 by 2

mfhi $t5          #get the remainder

move $t6, $t1     #hang on to what $t1 was originally

beqz $t5, even    #if the remainder is 0, it's even

add $t1,$t1,$t1    #it's odd, so add to itself

move $t2, $t6      #store what $t1 was originally to last value

bgt $t1, $t4, done #if the number is over 1000, we're done

li $v0, 4           #Print a comma and space

la $a0, space

syscall

j loop

even:

add $t1,$t1,$t2    #set $t1 = $t1 + Last value ($t2)

move $t2, $t6      #store what $t1 was originally to last value

bgt $t1, $t4, done #if the number is over 1000, we're done

li $v0, 4           #Print a comma and space

la $a0, space

syscall

j loop

done:

3 0
4 years ago
Discussed the economic and ideological cause of Americans, French and Chinese revolution​
alexgriva [62]

Answer:

The social, political, and economic causes of the American Revolution inevitably helped shape the country we live in today. A social cause that occurred was the disagreement between America and Britain and how poorly they were treated. A political cause that occurred was the implantation of legislatures on the colonies

Explanation:

5 0
3 years ago
Why do most teens prefer smartphones over laptops?
Pie

Answer:

bc social media purposes

8 0
3 years ago
Other questions:
  • While visiting a web site during your lunch break, you see a window that states the web site will not operate properly without f
    13·1 answer
  • what program searches the Internet for specified keywords and returns a list of the pages where the keywords were found
    8·1 answer
  • The shortcut key combination to cut text is. Ctrl+C Ctrl+X Shift+V Shift+Y​
    10·2 answers
  • A machine on a 10 Mbps network is regulated by a token bucket algorithm with a fill rate of 3 Mbps. The bucket is initially fill
    12·1 answer
  • Do most good businesses have to deal with conflict
    7·1 answer
  • It's not possible to die in an alcohol-related collision if you're not in an automobile.
    7·1 answer
  • The addresses a program may use to reference memory are distinguished from the addresses the memory system uses to identify phys
    15·1 answer
  • Could u help me on this u just have to compare how its alike please help ​
    5·2 answers
  • Why did they meet their friend<br><br><br><br><br><br><br><br>​
    8·2 answers
  • How to type an absolute reference formula in exel
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!