answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ANTONII [103]
2 years ago
5

To read encrypted data, the recipient must decipher it into a readable form. what is the term for this process? re-securing decr

yption assessment digitization
Computers and Technology
1 answer:
devlian [24]2 years ago
5 0
Decryption. When you use the same key for encryption as decryption, this is called symmetric encryption. When the keys are different, it is called asymmetric encryption.
You might be interested in
What are the differences between a policy, a standard, and a practice? What are the three types of security policies? Where woul
hjlf

Answer:

  • The difference between a policy, a standard and a practice is as follow:
  1. Policy: It can be defined as the written instructions that describe proper behavior.
  2. Standard: It can be defined as the detailed statement of what must be done to comply with policy.
  3. Practice: It can be defined as the examples of actions that would comply with policy.
  • The three types of security policies are:
  • Enterprise Information Sec. Policy (EISP) : High level policy that sets the strategic direction, scope, and tone for the organization's security efforts. Use: It is used to support the mission, vision and direction of the organization and sets the strategic direction, scope and tone for all security efforts
  • Issue Specific Sec. Policy (ISSP) : An organizational policy that provides detailed, targeted guidance to instruct all members of the organization in the use of a resource, such as one of its processes or technologies. Use: It is used to support routine operations and instructs employees on the proper use of these technologies and processes
  • System Specific Sec. Policy (SysSP): Organizational policies that often function as standards or procedures to be used wen configuring or maintaining systems. SysSPs can be separated into two general groups-managerial guidance and technical specifications- but may be written as a single unified document. Use: It is used as a standard when configuring or maintaining systems.
  • ISSP policy would be needed to guide the use of the web, email and use of personal use of office equipment.

3 0
2 years ago
You resurrected an old worksheet. It appears to contain most of the information that you need, but not all of it. Which step sho
vagabundo [1.1K]

Answer:

The answer is "check the worksheet is not read only"

Explanation:

The read only mode is used for read the file data, and it doesn't allows the user to update the file, and for updating the worksheet we should check iut does not open in the read-only mode.

If it is open, then we close it and for close we goto the office button and click on the tools option after that goto general setting, in this there is a check box for turn off the read-only mode.

 

8 0
2 years ago
Write a class called Counter that represents a simple tally counter, which might be used to count people as they enter a room. T
Sonja [21]

Answer:

Code is in java

Explanation:

Code is self explanatory, added come comments to explain more about the code.

public class CounterDriver {

   public static void main(String[] args){

       // Creating counter first object

       Counter counter1 = new Counter();

       //performing 2 clicks

       counter1.click();

       counter1.click();

       // displaying counter 1 click count

       System.out.println("Total Number of counter1 clicks :"+counter1.getCount());

       // resetting counter 1 click count

       counter1.reset();

       // again displaying click count which will be 0 after reset

       System.out.println("Total Number of counter1 clicks :"+counter1.getCount());

      // Same operation goes with counter 2  

       // the only difference is that it performs 3 clicks

       Counter counter2 = new Counter();

       counter2.click();

       counter2.click();

       counter2.click();

       System.out.println("Total Number of counter2 clicks :"+counter2.getCount());

       counter2.reset();

       System.out.println("Total Number of counter2 clicks :"+counter2.getCount());

   }

}

class Counter{

   int count;

// defining constructor which will initialize count variable to 0

   public Counter(){

       this.count=0;

   }

// adding click method to increment count whenever it's called

   public void click(){

       this.count++;

   }

// getCount method will return total count

   public int getCount(){

       return this.count;

   }

// reset method will set count to 0

   public void reset(){

       this.count = 0;

   }

}

4 0
2 years ago
Write a statement that uses a conditional expression that determines if the credits variable is less than 0. If the condition is
gtnhenbr [62]

Answer:

The statement and the expression is "credits = credits<0?0 : credits;" for the above question.

Explanation:

  • The conditional expression is an expression that is used to determine the true and the false case. It works like the if and the else statement.
  • It has three parts which are shown above, in which the first part is to check the condition, the second part is excuted if the condition is true and the third part is executed if the condition is false. The variable is used to assign the value.
  • If any user provides the credit value and writes the above statement then the credit variable holds 0 for negative value and it holds the original value for any positive or zero value.
8 0
2 years ago
Carlos wrote a check for $44.92 to pay his gas bill. He’ll use the check register to record his transaction. What will be his ne
Finger [1]

Answer:

-44.92

Explanation:

If he has no money hell be in the hole

8 0
2 years ago
Other questions:
  • Your computer has gradually slowed down. What's the most likely reason?
    8·1 answer
  • What does a sticky CTA do?
    9·2 answers
  • Secure Wi-Fi networks and VPNs use _____ to secure data transferred over a network.
    13·1 answer
  • Witch printer covers a large range of colors than any other printer does
    15·2 answers
  • Convert the following binary number to octal (111000)2​
    12·1 answer
  • Write a static method, getBigWords, that gets a single String parameter and returns an array whose elements are the words in the
    15·1 answer
  • The following parts were ordered by someone building a personal computer:
    12·1 answer
  • A Color class has a method getColorName that returns a string corresponding to the common name for the color, e.g., yellow, blue
    11·1 answer
  • 2 Name the package that contains scanner class?​
    10·1 answer
  • .Ten pounds of candy were prepared for the school party.
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!