1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Pepsi [2]
2 years ago
6

PLS HELP ASAP ILL GIVE BRAINLKEST PLS THANKS 20 POINTS

Computers and Technology
2 answers:
OLga [1]2 years ago
5 0

Answer:

#1?

Explanation:

Might be wrong..

Mazyrski [523]2 years ago
3 0

↓ Scroll Down to See Answer ↓

∧-∧ But Read the Explanation to Make Sure ∧-∧

Answer/Explanation:

These algorithms have undergone extensive security analysis and are continually tested to ensure that they provide adequate security. Cryptographic algorithms will usually use cryptographic keys and when these algorithms need to be strengthened, it can often be done by using larger keys.

Encryption uses complex algorithms to scramble data and decrypts the same data using a key provided by the message sender. Encryption ensures that information stays private and confidential, whether it's being stored or in transit. Any unauthorized access to the data will only see a chaotic array of bytes.

The strength of an algorithm, is defined both in terms of it's key size, as well as it's resistance to cryptanalytic attacks. We say an algorithm is broken if there exists an attack better than brute force. So, with AES and a 128-bit key, AES is considered "secure" if there is no attack that less than 2^128 work.

There seems to be an emerging requirement to specify cryptographic strength objectively  rather than subjectively with adjectival descriptors such as weak, good or strong. It is expected  that U.S. Government (USG) and industry will soon require specific quantitative data to define the  point at which a cryptographic technology or product will satisfy user requirements.

Knowing that these 2 Choices Don't really look Right...

Because it our job = Wrong

Because encryption algorithm are always weak = Wrong

So It leads us to these...

To Prevent all Decryption = ?

To protect online Information = ?

But Base on the Information below:

Encryption can help protect data you send, receive, and store, using a device. That can include text messages stored on your smartphone, running logs saved on your fitness watch, and banking information sent through your online account.

Encryption is the process that scrambles readable text so it can only be read by the person who has the secret code, or decryption key. It helps provide data security for sensitive information.

Vast amounts of personal information are managed online and stored in the cloud or on servers with an ongoing connection to the web. It’s nearly impossible to do business of any kind without your personal data ending up in an organization’s networked computer system, which is why it’s important to know how to help keep that data private.

I would say the Answer is To Protect Online Information.

You could Read the Explanation Above If you want to Check.

[RevyBreeze]

You might be interested in
What are the advantages of businesses using Twitter ?
Natasha_Volkova [10]

Answer:Through Twitter, businesses can reach a larger target audience within their key demographics through the use of hashtags and applicable media.

Explanation:

4 0
3 years ago
Assuming that t is an array and tPtr is a pointer to that array, which expression refers to the address of element 3 of the arra
stealth61 [152]
<span>According to the basics of C++ syntax, &t[ 3 ] refers to the address of element 3 of the array given above. The array can be imagined like a box with some stuff. This stuff is the numbers which should be in "[ ... ]" with name of the array written before and "&".</span>
7 0
3 years ago
Which of the following is a reason why the comments tool within PDF documents could be helpful? (Select all that apply.)
sveta [45]
You can use it to suggest edits for the document.

You can use it to make a note of clarification for someone else examining the document.

You can use it to cover up mistakes within the document.

That's what I think.
7 0
3 years ago
Which of the following best describes a server?
Lady_Fox [76]

Answer:

number 4

Explanation:

7 0
3 years ago
Read 2 more answers
4.5 Code Practice
Alex787 [66]

Answer:

The answer to this question is given below in the explanation section.

Explanation:

This program is written in C++.

                                                                         

#include <iostream>

using namespace std;

int main()

{

   

   string word;// variable for taking user input

   int cond;// to set condition true if user preses the stop and exit from loop

   

   cout<<"Enter word: \n";

   cin>>word;

   do// start while loop

   {

       

       

       if(word=="stop" || word =="STOP" || word == "Stop")// if user enter word stop, then program exit

       {

       cond=0;

       

       }

       else//otherwise loop continue

       {

           cout<<" You Entered "+ word +"\n";

           cout<<"Enter word: \n";

           cin>>word;

           cond=1;

       }

   }  

   while(cond == 1);// if user don't enter word "stop" loop run continuesly.  

   cout<<"Program exit";

   

   return 0;

}

5 0
3 years ago
Other questions:
  • A brick weighs 26 N. Measured underwater, it weighs 11 N.
    10·1 answer
  • Write a Java program to count the characters in each word in a given sentence?Examples:Input : geeks for geeksOutput :geeks-&gt;
    10·1 answer
  • Which camera mode gives the photographer the greatest amount of control?
    7·2 answers
  • Dorothy needs to edit JPEG and GIF files in a multimedia application. Which software can Dorothy use to edit these files?
    8·2 answers
  • What is lossless compression
    6·2 answers
  • Claire wants to use a conditional statement in JavaScript that provides a block of statement to be executed if the condition is
    7·2 answers
  • Answer This One Question Right For Brainliest
    10·1 answer
  • The ability to use various design software such as Adobe Photoshop, InDesign, and Illustrator would be MOST beneficial to which
    6·1 answer
  • What role do play in medicine ​
    11·1 answer
  • NAT addresses concerns over the dwindling IPv4 address space by ___________________. 1 point allowing networks to use fewer IP a
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!