1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kozerog [31]
2 years ago
14

What technique is used to make sure that messages sent over the internet have not been changed?.

Computers and Technology
1 answer:
Gelneren [198K]2 years ago
5 0

Answer:

Authentication

Explanation:

Authentication allows for the verification of a message's origin, and integrity provides proof that a message's contents have not changed since it was sent. Additionally, non-repudiation ensures that a message sender cannot deny sending the message.

You might be interested in
It takes Mike 18 minutes to finish reading 4 pages of a book. How long would it take for him to finish 30 pages ?​
miss Akunina [59]

Answer:

135 minutes or and 2 hrs and 15 minutes

6 0
3 years ago
Briefly explain specialisation?​
Jlenok [28]

Answer:

b

Explanation:

4 0
3 years ago
Which is a sentence fragment?
ehidna [41]
C is a sentence fragment it does not have a verb
5 0
3 years ago
What are the values of the following expressions? In each line assume that,
MissTica

Answer:

double x = 2.5;

double y = -1.5;

int m = 18;

int n = 4;

string s = "Storm";

string t = "Watch";

The output of the expression "x + n*y - (x+n)*y" is "6.25".

and the output of expression "m/n + m%n" is "6".

Explanation:

for the first expression,

x + n*y - (x+n)*y ,put value of every variables in it.

=2.5+4*(-1.5)-(2.5+4)*(-1.5)

=2.5-6.0-(6.5*(-1.5)

=-3.5+9.75

=6.25

for the second expression,

m/n + m%n,  put value of every variables in it.

=18/4 +18%4

=4+2      ("/ will give quotient and % will give remainder")

=6

4 0
3 years ago
In order for a sort to work, which of the following is required?
nydimaria [60]
Can u plz give me a picture
3 0
2 years ago
Other questions:
  • Which of the following would likely be covered under homeowners insurance but NOT by renter's insurance?
    9·2 answers
  • What is an examlple of cyberbullying
    5·1 answer
  • Altering grade records within a computer system is called
    11·2 answers
  • What is the difference between an internal and an external method call? In what situation would only internal calls be needed?
    11·1 answer
  • Is 5g harmful to the body ?
    9·2 answers
  • It is believed that Taiwan is the original home of these early Oceania explorers. Maori Lapita Polynesians Aborigines
    13·2 answers
  • Use the drop-down menus to match each description with the part of a report where it is located.
    10·1 answer
  • The 0-1 knapsack problem is the following. A thief robbing a store finds n items. The ith item is worth vi dollars and weighs wi
    14·1 answer
  • Heeeeeeeelp :)<br> thx<br> jfdyiusjmkdsuiho;dmcvrvho;j
    5·2 answers
  • What type of software is needed access the internet
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!