1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kozerog [31]
2 years ago
14

What technique is used to make sure that messages sent over the internet have not been changed?.

Computers and Technology
1 answer:
Gelneren [198K]2 years ago
5 0

Answer:

Authentication

Explanation:

Authentication allows for the verification of a message's origin, and integrity provides proof that a message's contents have not changed since it was sent. Additionally, non-repudiation ensures that a message sender cannot deny sending the message.

You might be interested in
What does the proofreading mark "..." mean?
scZoUnD [109]

Answer:

I believe "..." means that you need to go further in depth with your writing.

3 0
3 years ago
Read 2 more answers
If anyone know python code, your answer will be valuable.
Veseljchak [2.6K]

Answer:

Explanation:

B

4 0
3 years ago
Read 2 more answers
You are configuring a RAID drive for a Media Streaming Server. Your primary concern is the speed of delivery of the data. This s
babymother [125]

Answer:

Raid 0

Explanation:

Raid 0 is a configuration used for speed priority. Datas are stored differently on each disk

3 0
1 year ago
Which of these is not used by analysts when adopting CASE tools? (1 point) (Points : 1.5) communicating more effectively with us
mojhsa [17]

Answer: expediting the local area network

Explanation: Case tools are the tools or service that helps in the software development but the automatic activity. This tool can be applied on various applications like mobile apps, E-commerce websites etc.

Analyst focus on the features like improving productivity ,low time consumption,integration of the work and making the communication better with the users ,helps in producing large amount of the documents etc.

The only factor not accepted by analyst is accomplishing the operation in the LAN(local area network) as it does not facilitates this operation because it is not software development process.

4 0
3 years ago
Write a program that computes the area and perimeter of a rectangle given its radius
mezya [45]
D sag gg FYI hbd su such ja dash us di ggs xx NJ
7 0
3 years ago
Other questions:
  • All of the following can be caused by the movement of geologic plates EXCEPT
    15·1 answer
  • C++
    11·2 answers
  • . ____________is/are the JSP ImplicitObject(s).sessionapplicationconfigAll of GivenNone of Given
    9·1 answer
  • Polymorphism means ______________.
    15·2 answers
  • What is the python print of (“5”+”7”)?
    10·1 answer
  • Claire writes a letter to her grandmother, in which she describes an amusement park she visited last week. She adds pictures of
    13·1 answer
  • Part 2: a) Write VHDL code for a top module that invokes necessary components to display the four decimal digits on four seven-s
    5·1 answer
  • Write the Flowchart to find Even number between 1 to 50<br>​
    9·1 answer
  • When looking at aggregated logs, you are seeing a large percentage of Windows hosts connecting to an Internet Protocol (IP) addr
    5·1 answer
  • What is your idea for creating a new and fresh Gaming experience around viewing occasions for Mike's?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!