1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Pepsi [2]
2 years ago
6

PLS HELP ASAP ILL GIVE BRAINLKEST PLS THANKS 20 POINTS

Computers and Technology
2 answers:
OLga [1]2 years ago
5 0

Answer:

#1?

Explanation:

Might be wrong..

Mazyrski [523]2 years ago
3 0

↓ Scroll Down to See Answer ↓

∧-∧ But Read the Explanation to Make Sure ∧-∧

Answer/Explanation:

These algorithms have undergone extensive security analysis and are continually tested to ensure that they provide adequate security. Cryptographic algorithms will usually use cryptographic keys and when these algorithms need to be strengthened, it can often be done by using larger keys.

Encryption uses complex algorithms to scramble data and decrypts the same data using a key provided by the message sender. Encryption ensures that information stays private and confidential, whether it's being stored or in transit. Any unauthorized access to the data will only see a chaotic array of bytes.

The strength of an algorithm, is defined both in terms of it's key size, as well as it's resistance to cryptanalytic attacks. We say an algorithm is broken if there exists an attack better than brute force. So, with AES and a 128-bit key, AES is considered "secure" if there is no attack that less than 2^128 work.

There seems to be an emerging requirement to specify cryptographic strength objectively  rather than subjectively with adjectival descriptors such as weak, good or strong. It is expected  that U.S. Government (USG) and industry will soon require specific quantitative data to define the  point at which a cryptographic technology or product will satisfy user requirements.

Knowing that these 2 Choices Don't really look Right...

Because it our job = Wrong

Because encryption algorithm are always weak = Wrong

So It leads us to these...

To Prevent all Decryption = ?

To protect online Information = ?

But Base on the Information below:

Encryption can help protect data you send, receive, and store, using a device. That can include text messages stored on your smartphone, running logs saved on your fitness watch, and banking information sent through your online account.

Encryption is the process that scrambles readable text so it can only be read by the person who has the secret code, or decryption key. It helps provide data security for sensitive information.

Vast amounts of personal information are managed online and stored in the cloud or on servers with an ongoing connection to the web. It’s nearly impossible to do business of any kind without your personal data ending up in an organization’s networked computer system, which is why it’s important to know how to help keep that data private.

I would say the Answer is To Protect Online Information.

You could Read the Explanation Above If you want to Check.

[RevyBreeze]

You might be interested in
Robots can obtain data from the environment, store the data as knowledge, and modify their behavior
TiliK225 [7]
True robots that have integrated ML can store data in specialized arrays which can be processed by the algorithms to give the output as their behaviour.
5 0
4 years ago
When defining an array of class objects, how do you pass arguments to the constructor for each object in the array?
Nuetrik [128]
Basically, the array[ index ] is the name of the object so when you  populate the array you'd have statement[s] like:

array[ index ] = new ClassName( arg0, arg1, arg2 );
8 0
3 years ago
Want is the assignmment
AnnZ [28]
Can you explain this
4 0
3 years ago
Describe in detail how TCP packets flow in the case of TCP handoff, along with the information on source and destination address
Ilya [14]

Answer:

Following are the answer to this question:

Explanation:

There will be several ways to provide it, although it is simpler to let another front side Will work out a three-way handshake or transfer packages to there with a Server chosen. Its application responds TCP packets with both the destination node of the front end.

The very first packet was sent to a computer as an option. Mention, even so, that perhaps the end of the queue end remains in the loop in this scenario. Rather than obtaining this information from the front end like in the primary healthcare services, you have the advantage of this capability: its selected server helps to generate TCP state.

8 0
4 years ago
34. The variable j starts with the value 10. The variable k starts with the value 2. The variable l starts with the value 4. Sto
larisa86 [58]

Answer:

Following is the program in C++ language :

#include <iostream> // header file

using namespace std; // namespace

int main() // main function

{

  int j=10; // initialized j to 10

  int k=2;// initialized k to 2

  int i=4;// initialized i to 4

cout<<"old value of j:"<<j<<endl<<"old value of i:"<<i<<endl<<"old value of k:"<<k<<endl;

  j=j*k;//Store the value of k times j in j.

  i=k*i;//Store the value of k times i in i .

  k=j+i;//add the value of j in i and store in k

  cout<<"new value of j:"<<j<<endl<<"new value of i:"<<i<<endl<<"new value of k:"<<k;

   return 0;

}

Output:

old value of j:10

old value of i:4

old value of k:2

new value of j:20

new value of i:8

new value of k:28

Explanation:

Following is the explanation of program:

  • Declared the variable "j" and initialized 10 to them.
  • Declared the variable "k" and initialized 2 to them.
  • Declared the variable "i" and initialized 4 to them.
  • Print the old value of "j","k" and "i" by using the cout statement.
  • Stored the value of "j" variable in the "k" times of "j" variable.
  • Stored the value of "i" variable in the "k" times of "i" variable.
  • Add the value of "j" variable into "i" variable and store in "k" variable.
  • Finally display the new value of i,j and k variable.

3 0
3 years ago
Other questions:
  • Soo...My Old 3DS XL haven't been touched in around a year...So i tried to charge it but no LED lights opened..Even the power but
    14·1 answer
  • Without a well-designed, accurate database, executives, managers, and others do not have access to the ____________________ they
    15·1 answer
  • Jose needs to find out how to delete cells from his workbook.
    12·2 answers
  • The variable most_recent_novel is associated with a dictionary that maps the names of novelists to their most recently published
    12·1 answer
  • The default paper size is _____. <br> a. letter <br> b. legal <br> c. executive <br> d. statement
    7·1 answer
  • Piers lives in an apartment and has an existing home television connection. He wants to subscribe to a high-speed internet conne
    13·1 answer
  • Describe a situation in which you have experienced harm as a consequence of a failure of computer security. Was the failure mali
    6·1 answer
  • The fill command try’s to fill or generate content for cells based on a ________.
    15·1 answer
  • Data source contains addresses of the merge fields. true or false​
    8·1 answer
  • Is it possible to construct a wait-free n-thread PeekableStack(2) object from an arbitrary number of atomic Stack objects and at
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!