1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Liula [17]
3 years ago
10

I need answer for this urgent plsdsss

Computers and Technology
2 answers:
Lilit [14]3 years ago
3 0

Answer:

Receiver

Explanation:

bcz the private key is kept only by the receiver of the message.

Paul [167]3 years ago
3 0
Receiver. Private key can be used to do decryption.
You might be interested in
Zenmap's topology tab displays a __________ that shows the relative size and connection type of all discovered ip hosts.
VladimirAG [237]
<span>Zenmap's topology tab displays a "Bubble Chart" that shows the relative size and connection type of all discovered IP hosts.
</span>A kind of chart which shows three dimensional data is known as Bubble chart. It also can be seen as the variation of scatter plot where bubbles replace the data points.
4 0
3 years ago
Self-disclosure is most likely to occur _____________.a.
Feliz [49]

The answer is..

C.  During one-on-one conversations

4 0
3 years ago
Read 2 more answers
What is a client server network and its features?​
maks197457 [2]

Answer:

A client-server network is the medium through which clients access resources and services from a central computer, via either a local area network (LAN) or a wide-area network (WAN), such as the Internet. ... A major advantage of the client-server network is the central management of applications and data.

8 0
3 years ago
What are some consequences of internet addiction​
fenix001 [56]

Answer:

<em>1</em><em>. </em><em>week</em><em> </em><em>eyesight</em>

<em>2</em><em>. </em><em> </em><em>weak</em><em> </em><em>brain</em><em> </em><em>power</em>

<em>3</em><em>. </em><em>loss</em><em> </em><em>of</em><em> </em><em>concentra</em><em>tion</em><em>.</em><em>.</em><em>.</em>

<em>hope</em><em> </em><em>it</em><em> </em><em>helps</em><em> </em><em>u</em>

4 0
3 years ago
When using a template to compose a memorandum which key on the keyboard moves the cursor to the next field
marishachu [46]
The tab key moves the cursor to the next field in the tab order, which is set by the programmer.
8 0
3 years ago
Other questions:
  • Melissa is the network administrator for a small publishing company. as network administrator, she is in charge of maintaining t
    8·1 answer
  • Select the correct answer from each drop-down menu.
    10·1 answer
  • Your mom is trying to save room on her hard drive and wants to uninstall some of her applications. She asks you how to do this.
    11·2 answers
  • What is an example of the most important role of a systems analyst in any corporation?
    10·1 answer
  • Why do electronic devices gather so much dust? Thanks
    8·1 answer
  • Computer memory uses different numbers of bytes to store different data types.
    7·1 answer
  • Read the citation example, and then use the drop-down menus to identify each part.
    8·2 answers
  • Write an algorithm and flowchart to display H.C.F and L.C.M of given to numbers.​
    9·1 answer
  • Part of the operating system core is responsible for controlling security, managing the file system, and providing a platform fo
    6·1 answer
  • Outline various methods of collecting data
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!