1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Liula [17]
3 years ago
10

I need answer for this urgent plsdsss

Computers and Technology
2 answers:
Lilit [14]3 years ago
3 0

Answer:

Receiver

Explanation:

bcz the private key is kept only by the receiver of the message.

Paul [167]3 years ago
3 0
Receiver. Private key can be used to do decryption.
You might be interested in
The google android mobile operating system is a proprietary system, for use on only approved devices.​
balandron [24]
I would choose b. False
7 0
3 years ago
I have to make a online presentation, which program is the best
LiRa [457]
If you want an online presentation, I think you mean by a website.
Best thing you can find is Google Slides.
if you want a program,
LibreOffice is your best bet. It is completely free and it is for Linux, Windows and possibly Mac.
4 0
3 years ago
Read 2 more answers
A network manager is interested in a device that watches for threats on a network but does not act on its own, and also does not
Ghella [55]

Answer:

B. NIDS

Explanation:

From the question we are informed about A network manager is interested in a device that watches for threats on a network but does not act on its own, and also does not put a strain on client systems. The BEST device to meet these requirements is NIDS. Network intrusion detection system known as "NIDS" can be regarded as a system that can attempt in detection of hacking activities as well as denial of attack on computer network. It can monitor network traffic and can as well detect malicious activities through identification of suspicious patterns in any incoming packet.

3 0
3 years ago
Thomas drew a rectangle with an area of 6 square cm what is the greatest possible perimeter of this rectangle
lisabon 2012 [21]
The greatest possible perimeter would be 14cm.

3 0
3 years ago
What does a controller control?
ruslelena [56]

Answer:

b. the interface between the hard disk and the system bus

Explanation:

A controller, in the most basic computing terms, is a hardware chip or card that falls between two hardware components. Thus, a computer’s motherboard will always have a controller that interfaces with RAM, hard disk, DVD drives or other hardware components. Being an interface between two hardware devices facilitate incoming and outgoing commutations. Option B therefore, is the correct answer because it interfaces between the hard disk and sytem bus, which are both hardware components.

8 0
3 years ago
Other questions:
  • You've been asked to find the average of a range of numbers. Which of the following could you use to find the average of cells A
    9·1 answer
  • Many web pages today use ____ —small text files that are stored on your hard drive by a web server, typically the one associated
    6·2 answers
  • Whatisthebestlocationapp for my androidphonebesidesgoogle maps?
    9·1 answer
  • Edhesive 4.1 question 1
    9·1 answer
  • Early in the history of technology, the development of tools and machines was based on _____ versus scientific knowledge as is d
    14·1 answer
  • Which statement best compares routers and hubs?
    9·1 answer
  • Stuart wants to delete some text from a slide. What should Stuart do?
    8·1 answer
  • Select the correct answer.
    14·1 answer
  • Your company is getting negative feedback on the current customer service process. It’s your job to make sure customers are happ
    10·1 answer
  • What is the best way to share a document that contains many image or audio files.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!