1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vladimir79 [104]
3 years ago
8

write a short paragraph (three to four sentences) that explains how it works for computers and internet communications in relati

on to cybersecurity.
Computers and Technology
1 answer:
mario62 [17]3 years ago
5 0

Answer:

Public and private keys form the basis for public key cryptography, also known as asymmetric cryptography. In public key cryptography, every public key corresponds to only one private key. Together, they are used to encrypt and decrypt messages. If you encode a message using a person’s public key, they can decode it using their matching private key.

Explanation:

Change up the wording.

You might be interested in
Which event occurred in the 1990s?
Amanda [17]

Answer:

C) Sun Microsystems released Java.

Explanation:

Sun Microsystems released in May 1995.  Of course, Sun Microsystems was then bought by Oracle.  Today, it's said that Java is the most commonly used programming language and that over over 3 billion devices use it.

It was created by James Goesling, a Canadian from Calgary, Alberta.

Let's check the other dates to be sure:

A) Niklaus Wirth developed Pascal. : 1970

B) The Department of Defense released Ada.  1980

D) Bjarne Stroustrup developed C++.: 1985

5 0
3 years ago
What statement best decribes the relashionship bewteen science and technoligy?
butalik [34]
The correct answer would be A.
7 0
4 years ago
Read 2 more answers
To a traditional computer, one means
blagie [28]

a.on , off

In most computer processors, electron movement is controlled by tiny switches that turn this flow of electricity on and off...zero represents off and one represents on

4 0
4 years ago
I want to write a C++ program to read the diameter of a circle. The program should find and display the area and circumference o
Andreas93 [3]

Answer:

#include <iostream>

const double PI = 3.14159;

int main() {

   double diameter;

   std::cout << "Please enter the diameter of the circle:" << std::endl;

   std::cin >> diameter;

   double radius = diameter / 2;

   double area = radius * radius * PI;

   double circumference = 2 * radius * PI; // or diameter * PI;

   std::cout << "Area: " << area << std::endl;

   std::cout << "Circumference: " << circumference << std::endl;

}

Explanation:

The first line imports the read/write library. The rest should be self-explanatory.

std::cin is the input stream - we use it to get the diameter

std::cout is the output stream - we write the answers (and commentary) there.

std::endl is the special "character" informing the output stream that we want it to put a newline character (and actually print to the output - it might have been holding off on it).

the // in the circumference computation signifies a comment - the program simply ignores this. I've added it to tell the reader that the circumference could have been computed using the diameter,

7 0
3 years ago
If an M:N relationship is mandatory on both sides, and if both relations resulting from the entities involved in the relationshi
vivado [14]

Answer:

0

Explanation:

In the problem above, the relationship that exists between M and N is discovered to be on each side of the system. Furthermore, it was stated that the outcome of the relationship also has approximately 3 records. This shows that there is no record for the bridge that is formed as a result of the relationship.

4 0
4 years ago
Other questions:
  • Radio waves pros and cons
    10·2 answers
  • Lee purchased a new pc from dell computer's web site. he purchased his product via a(n) ________.
    13·1 answer
  • The first computer (the eniac was how big
    8·1 answer
  • Which of the following is the most-polluting energy source?
    7·2 answers
  • Nappropriate use of technology makes it easier for cyber bullies to <br> others.
    5·2 answers
  • A stepping function allows a program
    11·2 answers
  • In a black box model are the customers told that they should be expecting to be haxked?
    13·1 answer
  • Write a program that will input two numbers and print the larger number on the screen.
    13·1 answer
  • When individuals are purchasing a computer, they sometimes might get the most expensive computer they can afford. Why might this
    7·1 answer
  • Write 10 sentences of your own and underline the verb.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!