1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Leya [2.2K]
3 years ago
11

​passwords used as encryption ________ help to make hijacked data unusable.

Computers and Technology
1 answer:
DerKrebs [107]3 years ago
5 0
Passwords are used<span> for authentication and </span>encryption. Password entropy is a measurement of how unpredictable a password is.
Passwords used as encryption keys help to make hijacked data unusable. The encryption key is a <span>random string of bits created explicitly for scrambling and unscrambling data.</span>
You might be interested in
How come the scroll bar on the PA emojis only appears sometimes? how do I make it appear?
astraxan [27]
Answer it your own self everybody can't always give u the answers
5 0
4 years ago
Which of the following is not a characteristic of a healthy relation?
dlinn [17]
Where is the problem at?
5 0
4 years ago
Who elso does their online school in their bed cause i do
Katen [24]

Answer:

yeah same

Explanation:

3 0
3 years ago
Read 2 more answers
Which type of image is not a supported using the online picture or insert picture command?
Anarel [89]

Answer:

thumbnail pane

Explanation:

just took the review for it

5 0
3 years ago
So if brainly teaches me better why do we even have real life teachers??????
Katarina [22]

Answer:

i dont know maybe becuse the l.a.w says so?

Explanation:

7 0
3 years ago
Other questions:
  • What is the advantage of defining a target user?
    14·1 answer
  • Which of the following is true about a point-and-shoot camera? They always have lenses that you can take on and off. They are of
    8·2 answers
  • When you define a table's primary key, the dbms automatically creates a(n) _____ index on the primary key column(s) you declared
    14·1 answer
  • Define a model or version that is used to test an idea is called a _______.
    7·1 answer
  • Notice in the topology there are 3 network ranges that would be translated based on the ACL created. What will happen if more th
    6·1 answer
  • How are computers used in producing weather forecasts?
    8·1 answer
  • _____________ helps to control and limit the number of consecutive request failures that cross a threshold. Review breaker Micro
    7·1 answer
  • What does the following code segment do?
    13·1 answer
  • Denise found a volume of documents in the trash bin that contained individuals, names, social security numbers and years of birt
    14·1 answer
  • Why is it important to prevent financial loss
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!