1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
dmitriy555 [2]
3 years ago
9

Match each item with a statement below. - Uses two keys: one to encrypt data and one to decrypt data - Encryption algorithm used

for the Data Encryption Standard - Uses a single key to encrypt and decrypt data - A digital document that verifies the two parties exchanging data over the Internet are really who they claim to be - Used for verification, takes a variable-length input and converts it to a fixed-length output string - Used to find the same hash value for two different inputs and reveal any mathematical weaknesses in a hashing algorithm - Operate on plaintext one bit at a time - A structure consisting of programs, protocols, and security policies for encrypting data and uses public key cryptography to protect data transmitted over the Internet - A sequence of random bits generated from a range of allowable values - The use of random data alongside plaintext as an input to a hashing function so that the output is unique
Computers and Technology
1 answer:
Vsevolod [243]3 years ago
5 0

Answer:

Does increased security provide comfort to paranoid people? Or does security provide some very basic protections that we are naive to believe that we don't need? During this time when the Internet provides essential communication between literally billions of people and is used as a tool for commerce, social interaction, and the exchange of an increasing amount of personal information, security has become a tremendously important issue for every user to deal with.

Explanation:

You might be interested in
In the Dynamic Partitioning technique of memory management, the placement algorithm that scans memory from the location of the l
Shtirlitz [24]

Answer:

best-fit

Explanation:

Best-fit: Closest in size to the request: In the Dynamic Partitioning technique of memory management, the placement algorithm that scans memory from the location of the last placement and chooses the next available block that is large enough to satisfy the request

3 0
3 years ago
Write a C++ program to read N numbers. Find sum, product, and average of N numbers
netineya [11]

Answer:

// here is code in c++

// headers

#include <bits/stdc++.h>

using namespace std;

// main function

int main()

{

   // variables

   int n,num;

   double sum=0, avg;

   long long int prod=1;

   cout<<"Enter value of N:";

   // read value of N

   cin>>n;

   cout<<"enter "<<n<<" numbers:";

   // read the N numbers

   for(int x=0;x<n-1)

   {

    cin>> num;

    // calculate sum of all

    sum=sum+num;

    calculate product of all

    prod=prod*num;

   }

   // print sum

   cout<<"sum of all "<<n<<" numbers is: "<<sum<<endl;

   // print product

   cout<<"product of all numbers is : "<<prod<<endl;

   print average

   cout<<"average of all "<<n<<" numbers is: "<<sum/n<<endl;

return 0;

}

Explanation:

Read the value of n from user.Then ask user to enter n numbers. Then calculate sum of all entered number and their product.After this calculate the average of entered number by dividing sum with n.Print sum, product and average of n numbers.

Output:

enter value of N:6

enter 6 numbers:1 2 3 4 5 6

sum of all 6 numbers is: 15

product of all numbers is : 120

average of all 6 numbers is: 2.5

3 0
3 years ago
What command do we use to enter data from the keyboard?
SVEN [57.7K]
D I would think……… good luck
6 0
3 years ago
Give 8 examples of Synchronous communication
SpyIntel [72]

Answer:

Synchronous communication examplesinclude: instant messaging, video conferencing, webcams, MUDs, MOOs, chat, Second Life. Examples of one-to-one synchronous communication include: instant messaging. Examples of one-to-manysynchronous communication include: video conferencing, MUDs, and MOOs.

5 0
3 years ago
Programming In C:
levacccp [35]

Our function will simply be the inverse of the given one: celsius and kelvin degrees differ by 273.15. You add this number is you compute kelvin from celsius, and you subtract this number if you're going the other way around (which is what we're doing):

#include

double KelvinToCelsius(double valueKelvin ) {

double valueCelsius = 0.0;

valueCelsius = valueKelvin - 273.15;

return valueCelsius ;

}

3 0
3 years ago
Other questions:
  • One reason for using social media is to develop social and professional contacts. True or false?
    9·2 answers
  • What is the difference between a rendering engine and a browser engine?
    5·2 answers
  • In the lab, wireshark continued to capture data in the background until the:
    15·1 answer
  • When you're working with a word processing document and you press the DEL Key what happens
    7·2 answers
  • Which of the following is NOT one of the Big 3 Google Applications that we discussed?
    9·2 answers
  • The company’s computer network is down. Who should you contact to correct this problem? Information Technology Associate Master
    12·1 answer
  • True or False: Wire service provide tabloid news reports to media outlets.
    12·1 answer
  • What is the difference between internet and intranet​
    9·2 answers
  • I need to convert seconds since Unix Epoch so like the year, month, day, hour, minute, and second but I cannot figure it out. If
    14·1 answer
  • Your college has several campuses located across the city. within each campus, the buildings are interconnected with a campus ar
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!