1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Liula [17]
3 years ago
10

I need answer for this urgent plsdsss

Computers and Technology
2 answers:
Lilit [14]3 years ago
3 0

Answer:

Receiver

Explanation:

bcz the private key is kept only by the receiver of the message.

Paul [167]3 years ago
3 0
Receiver. Private key can be used to do decryption.
You might be interested in
As you move through your professional career, you will receive requests for favors and contributions. You will not be able to ho
Alika [10]

Growing professionally comes with advises, comments (solicited and unsolicited), request for favours and also contributions. Moving up your professional career from the days of little beginning have always been accompanied with all of the requests and comments. As one levitates successfully, requests and contributions tend to increase. This can be scary and at the same time tiring as you go to question the sensibility of some of your decisions. While being inundated with these ’assistance', it is important that you carefully and thoroughly select the comments, contributions, requests of favours etc that is worth responding to. While some would be considered others will be discarded. Now, the question is how best can we politely turndown a person's request of favours and contributions without sounding rude, ungratetul and condescending. Both useful and irrelevant contributions deserve good responses. We could start by appreciating the request for favours and contributions, and tell whomsoever it may concern that you appreciate his/her assistance but unfortunately would not be needing them.

8 0
4 years ago
Janeal spends her day looking at the stock and bond markets and evaluating how the portfolios of the businesses she serves will
pychu [463]

Answer:

ur answer good sir will be : financial analyst

and a brainliest will be good to thnx

4 0
4 years ago
Which image file format is the most widely used?
Ostrovityanka [42]

Answer: jpeg because its a lot of people use it for quaity

7 0
2 years ago
Ebba has received a new initiative for her security team to perform an in-house penetration test. What is the first step that eb
myrzilka [38]

The first step that Ebba should take is: Information gathering and Reconnaissance.

<h3>What is an In-house Penetration Test?</h3>

An in-house Penetration test is a form of offensive test that is aimed at finding the lapses that a system has and initiating attacks to know the best way to prevent them.

Before launching such a test it is advised to plan and gather information about the possible lapses.

This will help the pen tester to know what attacks to launch and the right measures to resolve them. So, the first step that Ebba should take is Information gathering and Reconnaissance.

Learn more about In-house Penetration test here:

brainly.com/question/19085749

3 0
2 years ago
A box contains two types of colored pencils: red and blue. it also has a few pens. you can pick only one item at a time. if you
kipiarov [429]
Xor because in the XOR gate, if both inputs are the same, the output is zero but if they're different, the output is one
3 0
4 years ago
Read 2 more answers
Other questions:
  • How do rubrics increase learning?
    15·2 answers
  • PLEASE HELP ASAP!!!!111 Read "Teenagers are rewriting the rules of the news" (find it somewhere and answer questions below)
    7·1 answer
  • Describe an application where a parallel circuit might work better than a series circuit.
    15·1 answer
  • What runs horizontally and is identified with numbers?
    12·2 answers
  • How can you prevent the flash from going off no matter how much light there is iready
    7·1 answer
  • What is the printout for the first statement in the main method?
    13·1 answer
  • Match the items with their respective descriptions.
    6·2 answers
  • A program reads three integer values. The three values are interpreted as representing the lengths of the sides of a triangle. T
    7·1 answer
  • SHORT ANSWERS:
    7·1 answer
  • How to assign some object key values to other name react const.
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!