1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mademuasel [1]
2 years ago
15

1. Go to a popular online electronic commerce site like Amazon. Place several items in your shopping cart, and then go to check

out. When you reach the screen that asks for your credit card number, right-click on the Web browser and select Properties. You may need to use the help feature of your browser to find the security protocols in use and the certificates used to secure your transactions. What did you find out about the cryptosystems and protocols in use to protect the transaction
Computers and Technology
1 answer:
MakcuM [25]2 years ago
7 0
On Amazon.com, I found that there are a few cryptosystems and protocols in place. The most interesting thing I found was that there were 12,292 blank lines of code before anything was actually written. Amazon ensures a secure transaction by encrypting the users information on the users end, and then decrypts their information on their end.
You might be interested in
A(n) ____________________ is a set of programs that coordinates all the activities among computer or mobile device hardware.
crimeas [40]
An Operating System is a set of programs that coordinates all activities. All activities among software and hardware.
8 0
3 years ago
An MP3 player is an example of which of the following types of computer
vlabodo [156]

Answer:

B) multi user -multi tasking

4 0
3 years ago
The stream cipher described in Definition 2.1.1 can easily be generalized to work in alphabets other than the binary one. For ma
Free_Kalibri [48]

Answer:

Check the explanation

Explanation:

1) supposing the keystream is a stream that is of random bits in Z26, we can describe a stream cipher based on the Latin Alphabet that is as follows (where A ↔ 0, B ↔ 1, C ↔ 2 etc):

y_{i} =x_{i} +k_{i} mod26

x_{i} =y_{i} -k_{i} mod26

2)

x_{i} =y_{i} -k_{i} = ” B ” − ” R ” = 1 − 17 = − 16 ≡ 10 mod 26 = ” K ” etc ·

The Decrypted Text is: ”KASPAR HAUSER”

8 0
3 years ago
PLZ HELP I AM TIMED!!!!
Nataliya [291]

Answer:

The correct answer is A.

Explanation:

I put D from the answer above and got it wrong and it said A was the correct answer. haha :)

4 0
3 years ago
Read 2 more answers
Among your selection in different online interfaces, which are your top three favorites?​
topjm [15]
What is this ? History or ?
6 0
3 years ago
Read 2 more answers
Other questions:
  • ISBN-13 is a new standard for identifying books. It uses 13 digits d1d2d3d4d5d6d7d8d9d10d11d12d13. The last digit d13 is a check
    9·1 answer
  • Describe an application where a parallel circuit might work better than a series circuit.
    15·1 answer
  • Justin Blake and Raegan Beast anyone?? I miss Jaegan a ton and I need a fangirl to talk to.
    13·1 answer
  • Florida Highway Safety and Motor Vehicles reported blank of traffic fatalities were alcohol-related in Florida in 2009.​
    8·1 answer
  • Which of the following actions is an example of "window dressing?" a. Using some of the firm’s cash to reduce long-term debt. b.
    13·1 answer
  • Write a program that reads students’ names followed by their test scores. The program should output each student’s name followed
    13·1 answer
  • In C!!
    11·1 answer
  • How does the Evaluate Formula dialog box help fix errors?
    9·2 answers
  • How to deactivate the brainly account?​
    13·1 answer
  • Where are 'if' and 'else' statements shown when printing a document in a word processor?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!