1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
dmitriy555 [2]
3 years ago
9

Match each item with a statement below. - Uses two keys: one to encrypt data and one to decrypt data - Encryption algorithm used

for the Data Encryption Standard - Uses a single key to encrypt and decrypt data - A digital document that verifies the two parties exchanging data over the Internet are really who they claim to be - Used for verification, takes a variable-length input and converts it to a fixed-length output string - Used to find the same hash value for two different inputs and reveal any mathematical weaknesses in a hashing algorithm - Operate on plaintext one bit at a time - A structure consisting of programs, protocols, and security policies for encrypting data and uses public key cryptography to protect data transmitted over the Internet - A sequence of random bits generated from a range of allowable values - The use of random data alongside plaintext as an input to a hashing function so that the output is unique
Computers and Technology
1 answer:
Vsevolod [243]3 years ago
5 0

Answer:

Does increased security provide comfort to paranoid people? Or does security provide some very basic protections that we are naive to believe that we don't need? During this time when the Internet provides essential communication between literally billions of people and is used as a tool for commerce, social interaction, and the exchange of an increasing amount of personal information, security has become a tremendously important issue for every user to deal with.

Explanation:

You might be interested in
should variables that contain numbers always be declared as integer or floating-point data types? why or why not? name potential
Stells [14]

No, it is not necessary that variables that contain numbers should always be declared as integer or floating-point data types.

It is not necessary that variables that contain numbers should be declared as integer and floating point data types. Because number can be declared with different data types.  As we know that data type is a vital aspect in programming. It describes the type of a value that is contained in a variable. It is the data type based on which memory is allocated to a number or any type of variables.

Numbers can be whole decimal/fractional, signed, unsigned, small, and long. Simply, they exist in a variety of values. According to their values range, the amount of memory is reserved.

Different programming languages offer different data types to store numbers, depending on their types and size. Let’s consider some examples of data types used in programming languages in order to declare variables holding numbers.

  • In Python int, float, and complex are the data types used to declare number type variables.
  • SQL uses INTEGER, SMALLINT , BIGINT , NUMERIC() , and DECIMAL() data types for numbers.
  • To deal with number type variables, Java has six predefined data types, such as int, long, short, byte, float, and double.
  • JavaScript uses a single data type called 'number' to declare numbers.
  • In C++, two fundamental data types, int and float, are used to represent numeric variables. But C++ is not only limited to these two data types. The data type char can also store numbers. Other data types for declaring numbers as variables are derived from int, float and char, such as short int, long int, signed int, unsigned int, double, long double, signed char, unsigned char etc. etc.

So in concluding remarks, declaring a number type variable is not only limited to using integers and floating-points data types. Rather it entirely depends on the respective programming language, and size and type of the number to be stored in the variable.

You can learn more about data types at

brainly.com/question/13438922

#SPJ4

6 0
2 years ago
What is the legal right granted to all authors and artists that gives them sole ownership and use of their words, software, pict
ICE Princess25 [194]

Answer:

copyright

Explanation:

3 0
4 years ago
An algorithm requires numbers.<br> O True<br> O<br> False
Naya [18.7K]
True hope this helps
6 0
3 years ago
Read 2 more answers
The Boffo Balloon Company makes helium balloons. Large balloons cost $13.00 a dozen, medium-sized balloons cost $11.00 a dozen,
IceJOKER [234]

Answer:

name = input("Enter customer name: ")

quantity = int(input("Enter quantity: "))

size = input("Enter size [large-medium-small]: ")

if size == "large":

   sales = (quantity / 12) * 13

if size == "medium":

   sales = (quantity / 12) * 11

if size == "small":

   sales = (quantity / 12) * 8.6

   

print(name + " ordered " + str(quantity) + " " + size + " ballons")

print("Total sales is $" + str(sales))

Explanation:

*The code is in Python.

Ask the user to enter name, quantity, and size

Check the size using if structure. Depending on the size, calculate the sales using the given cost for for a dozen.

Print the order information and total sales

4 0
3 years ago
Which type of storage disk and disk drive can you use in the given situation?
Margarita [4]

Answer:

The answer to this question is DVD and DVD-RW

Explanation:

6 0
3 years ago
Other questions:
  • What would be a situation in which you could use an excel chart to present your data
    8·2 answers
  • Which of the following is not a type of user account? A. Administrator b. Guest c. Group d. Standard
    10·1 answer
  • While working a night job at a call center, Eric creates an app called EatOut, which can be used to place orders at restaurants,
    14·1 answer
  • assume that you want to sort an array have 100000 elements which algorithm (insert sort algorithm or quick sort algorithm) is th
    12·1 answer
  • One advantage of using personal computers for Internet access is that they have relatively large screens for viewing Internet co
    7·2 answers
  • Aside from human user types, there are non human user groups. Known as account types, __________ are implemented by the system t
    10·1 answer
  • What happen if there is no authentication??
    10·2 answers
  • ________ is a group meeting-based process for requirements collection. a. Reverse engineering b. Joint application design c. Hum
    9·1 answer
  • Digital Media Equipment: Best Practices Quiz
    15·1 answer
  • Ethics related to all <br> artificial intelligence?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!