1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Pepsi [2]
2 years ago
6

PLS HELP ASAP ILL GIVE BRAINLKEST PLS THANKS 20 POINTS

Computers and Technology
2 answers:
OLga [1]2 years ago
5 0

Answer:

#1?

Explanation:

Might be wrong..

Mazyrski [523]2 years ago
3 0

↓ Scroll Down to See Answer ↓

∧-∧ But Read the Explanation to Make Sure ∧-∧

Answer/Explanation:

These algorithms have undergone extensive security analysis and are continually tested to ensure that they provide adequate security. Cryptographic algorithms will usually use cryptographic keys and when these algorithms need to be strengthened, it can often be done by using larger keys.

Encryption uses complex algorithms to scramble data and decrypts the same data using a key provided by the message sender. Encryption ensures that information stays private and confidential, whether it's being stored or in transit. Any unauthorized access to the data will only see a chaotic array of bytes.

The strength of an algorithm, is defined both in terms of it's key size, as well as it's resistance to cryptanalytic attacks. We say an algorithm is broken if there exists an attack better than brute force. So, with AES and a 128-bit key, AES is considered "secure" if there is no attack that less than 2^128 work.

There seems to be an emerging requirement to specify cryptographic strength objectively  rather than subjectively with adjectival descriptors such as weak, good or strong. It is expected  that U.S. Government (USG) and industry will soon require specific quantitative data to define the  point at which a cryptographic technology or product will satisfy user requirements.

Knowing that these 2 Choices Don't really look Right...

Because it our job = Wrong

Because encryption algorithm are always weak = Wrong

So It leads us to these...

To Prevent all Decryption = ?

To protect online Information = ?

But Base on the Information below:

Encryption can help protect data you send, receive, and store, using a device. That can include text messages stored on your smartphone, running logs saved on your fitness watch, and banking information sent through your online account.

Encryption is the process that scrambles readable text so it can only be read by the person who has the secret code, or decryption key. It helps provide data security for sensitive information.

Vast amounts of personal information are managed online and stored in the cloud or on servers with an ongoing connection to the web. It’s nearly impossible to do business of any kind without your personal data ending up in an organization’s networked computer system, which is why it’s important to know how to help keep that data private.

I would say the Answer is To Protect Online Information.

You could Read the Explanation Above If you want to Check.

[RevyBreeze]

You might be interested in
What’s the answer?............................
blsea [12.9K]

Answer:

b and c

hope I could help

6 0
3 years ago
Define a function compute gas volume that returns the volume of a gas given parameters pressure, temperature, and moles. Use the
Bogdan [553]

Answer:

Explanation:

import java.util.Scanner;

public class GasVolume {

final static double GAS_CONST = 8.3144621;

public static double computeGasVolume(double pressure,double temperature, double moles)

{

return moles*GAS_CONST*temperature/pressure;

}

public static void main(String[] args) {

Scanner scnr = new Scanner(System.in);

double gasPressure = 0.0;

double gasMoles = 0.0;

double gasTemperature = 0.0;

double gasVolume = 0.0;

gasPressure = 100;

gasMoles = 1 ;

gasTemperature = 273;

gasVolume = computeGasVolume(gasPressure, gasTemperature, gasMoles);

System.out.println("Gas volume: " + gasVolume + " m^3");

return;

}

}

6 0
3 years ago
Read 2 more answers
What is an unique text-based internet address corresponding to a computer's unique numeric IP address called
FromTheMoon [43]

Answer:

This is called a domain name

Explanation:

A domain name is an address used by internet users to access a website.

6 0
2 years ago
You are tasked with securing a small network for a client in which the following requirements must be met: If a user on the priv
nalin [4]

ANSWER:

E

EXPLANATION:

myHostname = window.location.hostname;

var myTLD = "." + myHostname.substring(myHostname.indexOf("wupload") + "wupload.".length).split(".")[0];

function afterLoad() {

 return

}

ieFixForFileSelectionOnChangeEventTimer = null;

function ieFixForFileSelectionOnChangeEvent(a) {

 $("#siteName").toggle();

 if ($("#inputFileSelection").val() == "") {

   ieFixForFileSelectionOnChangeEventTimer = setTimeout("ieFixForFileSelectionOnChangeEvent()", 200)

 } else {

   $("body")[0].focus()

 }

}

function urlencode(a) {

 return escape(a.toString().replace(/%/g, "%25").replace(/\+/g, "%2B")).replace(/%25/g, "%")

}

$(document).ajaxStart(function() {

 $("body").addClass("ajaxLoading")

});

$(document).ajaxStop(function() {

 $("body").removeClass("ajaxLoading")

});

$(document).ajaxError(function(d, c, a, b) {

 CMApplication.Widgets.Dialog.close();

 CMApplication.Widgets.Dialog.displayMessage(c.responseText, CMApplication.Widgets.Dialog.Types.exception)

});

jQuery.setCookie = function(b, c, a) {

 var d = new Date();

 d.setDate(d.getDate() + a);

 cookieDomain = ".wupload" + myTLD;

 document.cookie = b + "=" + escape(c) + ((a == null) ? "" : ";expires=" + d.toUTCString() + "; path=/;domain=" + cookieDomain + ";")

};

jQuery.getCookie = function(a)

4 0
3 years ago
Client/server awareness. Visit three local stores in your neighborhood or mall and notice the information technology in the stor
Kaylis [27]

local stores in neighborhood do not have computerized cash registers but they may have cameras if they are in a bad neighborhood. inventory is controlled by checking the shelves.


the Qs about computers, servers and clients are for national chain stores. they use clients at each store which are connected to the central servers at HQ. employees need special training as the system is complicated. the whole system is maintained by their IT department.


7 0
3 years ago
Read 2 more answers
Other questions:
  • The _____ function calculates the average of values in a range that match criteria you specify.
    14·1 answer
  • A financially stable person is able to
    12·2 answers
  • Write a program that implement a bubble sort ?
    5·1 answer
  • To speed up the display of graphics, a(n) ________ is integrated into some video cards. select one:
    12·1 answer
  • If the algorithm does not have instructions for unanticipated results, the computer program will
    15·1 answer
  • When hacking a website to test a secure connection and ensure internet safety, what is a good way to check the coding of the web
    14·1 answer
  • Informed _________ will better manage complexities and enable more efficient manufacturing of goods.
    13·1 answer
  • My phone takes forever to load the ads, does anyone else have this problem? Is there a way to fix it? I’ve tried getting another
    12·2 answers
  • Animals living in burrows under the ground is an interaction between the biosphere and the
    11·1 answer
  • What is a port?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!