1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kozerog [31]
3 years ago
14

What technique is used to make sure that messages sent over the internet have not been changed?.

Computers and Technology
1 answer:
Gelneren [198K]3 years ago
5 0

Answer:

Authentication

Explanation:

Authentication allows for the verification of a message's origin, and integrity provides proof that a message's contents have not changed since it was sent. Additionally, non-repudiation ensures that a message sender cannot deny sending the message.

You might be interested in
Different uses of quick access toolbar
zhannawk [14.2K]
“The Quick Access Toolbar provides access to frequently used commands, and the option to customize the toolbar with the commands that you use most often. By default, the New, Open, Save, Quick Print, Run, Cut, Copy, Paste, Undo, and Redo buttons appear on the Quick Access Toolbar” -Information Builders
5 0
3 years ago
Thabo has a small barber shop and he uses Microsoft applications to keep track of his stock and to create posters for advertisin
kirza4 [7]

An information system is crucial to the success of a business. Itemized below are five benefits of operating an information system in a business.

<h3>What are the benefits of an Information System?</h3>

Information systems are important because:

  1. They help to increase and enhance operational efficiencies such as accounting, sales, inventory, and HR operations.
  2. They help to minimize costs. As the business makes more and more informed decisions, its costs will drop.
  3. It enhances customer service. Information about customers helps the business to tailor its services to the requirements of each customer.
  4. Information system helps the decision-makers in the business to make better and more informed decisions.
  5. Information systems help to ensure business continuity.

<h3>What are the requirements for creating an information system?
</h3>

An information system requires the following:

  • Hardware for the computer workstation and addendums
  • Software
  • A network communication amongst the computers and hardware
  • a map of the company's processes and the people responsible for such processes
  • A procedural manual.
  • Existing data from the business.

For the barber's shop, for example, some of the components of the information system he must put in place are:

A workstation that collects information about:

  • Clients
  • Details of Sales
  • Expenses
  • Compliance dates and records etc.

Learn more about Information Systems at:

brainly.com/question/25226643

4 0
2 years ago
Shawn works at the local electrical company in Nampa, ID, which provides electricity to the entire city of Boise. This area is p
nexus9112 [7]

Answer:

D. Fault tolerance

Explanation:

  • Fault Tolerance basically refers to the feature or capability of a  system to keeps on working and performing its operations without interruption in case of a failure.
  • This failure can be the failure of one or more of its components.
  • This is beneficial as the system does not stop working or fail completely.
  • It provides copies of the same system or backup components which can be used when the existing system fails and prevents the loss of information and services.
  • Accessibility  refers to provide equal services for everyone who uses a system. So its not a correct option.
  • Moore’s law states that the computing speed and power will double every two years so its not a correct option as well.
  • Anti virus is a software to identify, prevent and remove viruses and malware so it is not a correct option as well.

3 0
3 years ago
It is not necessary to develop strategies to separate good information and bad information on the internet. True or False
Reptile [31]

The answer is False. You should always try to separate the information that could do harm, or isn't true.

6 0
3 years ago
A software team is setting an automation strategy and begins by identifying business processes that could benefit from automatio
mixas84 [53]

B is what I would guess.

5 0
3 years ago
Other questions:
  • What is a Boolean Expression?
    12·1 answer
  • Hybrid processors that can process 32 bits or 64 bits are known by what term?
    8·1 answer
  • When mysql automatically converts one data type to another, itâs known as a/an ______________________ conversion?
    15·1 answer
  • Which word processing file that contains text and other
    13·2 answers
  • What is one benefit of using electronic sticky notes ?
    9·2 answers
  • Wireless data networks are particularly susceptible to known ciphertext attacks.
    10·1 answer
  • Is greedy algorithm non deterministic by nature?
    13·1 answer
  • When entering a function or formula in a cell, which is the first character
    15·1 answer
  • The term embedded system refers to any device that includes a computer chip, but that is not a general-purpose workstation, desk
    5·1 answer
  • To optimize the flow of data into and out of the cpu, the modern mcc provides at least _______________ of data every time the cp
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!