Abdullah wants to send sessitive data. Abdullah wants to make sure that only ahmed can see and read this. How can abdullah protect this data, so that ahmed can only access it. By using this information make an algorithm.

Answers

Answer 1

Answer:

Use an encryption algorithm

Explanation:

An encryption algorithm can be used to hide the message from parties in-between or any third parties that might want to intercept the message being sent by Abudullah to Ahmed.

Encryption algorithms use cryptographic methods to encrypt or code data such that only the sender and receiver of that data have the keys to properly decode/decrypt these messages/data.


Related Questions

A database planner names a field “Organic ingredients_3”. Why would this name Create possible problems in programming?

Answers

Answer:

I think the answer is 2.

hope it will help you

Because it contains an embedded space

The place on the computer where information is stored temporarily so the processor can access it quickly is called what? Memory Kernel Mode Driver

Answers

Answer:

The answer is Memory

Which of the following characterizes pooled interdependence? Multiple Choice Each member has a great deal of discretion in terms of what they do and with whom they interact while collaborating to accomplish the team’s work. Interaction in the team only occurs between members who perform tasks that are next to each other in a sequence. Members interact with a subset of other members to complete the team’s work. Group members complete their work assignments independently, and then this work is simply "piled up" to represent the group’s output. Different tasks are done in a prescribed order, and the group is structured such that the members specialize in these tasks.

Answers

Answer:

Group members complete their work assignments independently, and then this work is simply "piled up" to represent the group’s output.

Explanation:

A pooled interdependence arise or occurs when the members of a group are able to function with relative independence and then their combined output or level of productivity is used to significantly augment the group's overall performance.

A characteristic of pooled interdependence is that group members complete their work assignments independently, and then this work is simply "piled up" to represent the group’s output.

How do you send a file to someone in an email? (Choose all that apply). A. Select Send File and choose the file you need. B. Select the paperclip icon and choose the file you need. C. Open the file and then select Send in your email. D. Select Attach and choose the file you need.

Answers

Answer:

C. Open the file and then select Send in your email.

D. Select Attach and choose the file you need.

Explanation:

Communication can be defined as a process which typically involves the transfer of information from one person (sender) to another (recipient), through the use of semiotics, symbols and signs that are mutually understood by both parties.

One of the most widely used communication channel or medium around the world is an e-mail (electronic mail).

An e-mail is an acronym for electronic mail and it is a software application or program designed to let users send and receive texts and multimedia messages over the internet.

A file can be defined as a computer resource that avails end users the ability to store or record data as a single unit on a computer storage device.

The following documents or files such as soft copy attachments, web links and web pages may be sent from one user to another through the use of an email.

On a related note, some of the methods used for sending a file to someone in an email are;

I. Open the file and then select Send in your email.

II. Select Attach and choose the file you need.

What is the role of memory in a computer​

Answers

Answer:

Computer random access memory (RAM) is one of the most important components in determining your system's performance. RAM gives applications a place to store and access data on a short-term basis. It stores the information your computer is actively using so that it can be accessed quickly.

very complex type of processing is carried out by a which computer​

Answers

Answer:

hope it helps you

Explanation:

Processing is the “work” being done, in a program. For example, if a program added up a series of a million different numbers in a file, and computed a total, then the computer would be said to be “processing”, during the time where the numbers were being accumulated into a total.

Interestingly though, a computer is also processing “all the time”, that is even when it is at rest. That is because the operating system, (and underlying hardware), are still doing things which can be referred to as processing as well.

For example, the time-clock in a computer is continually updating regardless if there is any other processing going on in a system. This would be termed OS (operating system) level processing

Write an algorithm and draw a flowchart for switching off a machine after it has made 500 glass bottles. use an appropriate conditional statement for this
please hurry i need urgent
please answer correct
or i will report

Answers

The algorithm is as follows:

1. Start

2. bottles = 0

3. While bottles != 500

3.1 Create bottle

3.2 bottle = bottle + 1

4. Switch off machine

5. Stop

Explanation:

This begins the algorithm

1. Start

This initializes bottles to 0

2. bottles = 0

The loop is repeated until 500 bottles is created

3. While bottles != 500

This creates a new bottle

3.1 Create bottle

This increments the number of bottles by 1

3.2 bottle = bottle + 1

This switches of the machine after all bottles are created

4. Switch off machine

End algorithm

5. Stop

THANKS

Select the six parts of the boot sequence. Computer displays details of the process BIOS confirms it has found boot loader Shortcuts and hotkeys loaded BIOS begins flashing process Boot loader loads operating system First sector of boot disk is accessed Computer performs POST Power goes to motherboard Printer prints test page

Answers

Answer:

Computer displays details of the process

BIOS confirms it has found boot loader

Boot loader loads operating system

First sector of boot disk is accessed

Computer performs POST

Power goes to motherboard

Explanation:

How is Ms word more suitable and easier for document designing?

Answers

Answer:

MS Word is a word processing application, that built with an excellent array of features that permit the editing of text documents, with fonts, margins, borders, and page layout properties. Tables, charts, word art, shapes and pictures can be easily added to enhance the appearance and professional look of documents, as well as being able to publish documents in Portable Document Format, PDF and other file formats

Using MS Word, users an create write contract documents, resume, write-ups, fliers, invitation cards, projects, and reports from several customizable templates available in the Online Templates option of creating New Documents

The application provides support and upgrade to users that enable them make the most use of their time by having the required text document creation features in one application

Explanation:

Other Questions
Which is a difference between the speech and the poster?The poster focuses on the effort of sending food abroad, but the speech does not.The speech focuses on both making contributions at home and sending food abroad, but the poster does not.The poster directly reminds civilians how they can contribute to the war effort, but the speech does not. The speech directly reminds civilians how they can contribute to the war effort, but the poster does not. Help please anyoneee 1. Assertion: Mother may be a carrier for haemophilia.Reason: The father is always a carrier for haemophilia.(a) Both Assertion and Reason are true and the Reason is a correct explanation of the Assertion.(b) Both Assertion and Reason are true but the Reason is not the correct explanation of the Assertion.(c) Assertion is true, but the Reason is false.(d) Assertion is false, but the Reason is true. Which devices are considered to be central venous access devices (CVADs)? (Select all that apply.) Group of answer choices Heparin locks Peripherally inserted central catheters (PICC lines) Implanted subcutaneous ports Saline locks The least-squares regression equationy = 3 + 1.16x can be used to predict the height of a plant (in centimeters) after x weeks. Suppose the height of a plant was 9.2 centimeters after 5 weeks.Calculate and interpret the residual for this plant after 5 weeks.The residual is 0.4, which means that the predicted height of the plant is 0.4 centimeters less than the actual height of the plant of 9.2 centimeters. Operating LeverageHaywood Co. reports the following data:Sales $6,160,000Variable costs (4,620,000)Contribution margin $1,540,000Fixed costs (440,000)Operating income $1,100,000Determine Haywood Co.s operating leverage. Round your answer to one decimal place. Read the scales of this balance.The unknown sample has a mass of:11.2 g01.012 kg1.220 gO 1.200 g In meiosis, sister kinetochores are attached to the same pole of the cell during meiosis I, and sister chromatid cohesion is released during anaphase II. What would be the likely result if sister kinetochores were attached to different poles of the cell during meiosis I and sister chromatid cohesion was released during anaphase I which primitive organic molecule was essential to form lipid bilayer? What is/are considered a family variable(s) that predict(s) lowerstress?Select one:Oa. Higher SESOb. Greater family cohesionc. Redefined roles and responsibilities to incorporatecaretaking needs0d. All of the aboveson where's ATP produced in a cell and how? Keisha writes that if an object has any external forces acting on it, then the object can be in dynamic equilibrium but notstatic equilibriumWhich statement best describes Keisha's error?An object that is not moving is always in static equilibrium.O An object that is moving must be in dynamic equilibrium.An object in either state of equilibrium must have no forces acting on it.An object in either state of equilibrium must have no net force acting on it. make you brainlists!quick Read the excerpt from Richard Wright's Black Boy. Hunger stole upon me so slowly that at first I was not aware of what hunger really meant. Hunger had always been more or less at my elbow when I played, but now I began to wake up at night to find hunger standing at my bedside, staring at me gauntly. The hunger I had known before this had been no grim, hostile stranger; it had been a normal hunger that had made me beg constantly for bread, and when I ate a crust or two I was satisfied. But this new hunger baffled me, scared me, and made me angry and insistent. Whenever I begged for food now my mother would pour me a cup of tea which would still the clamor in my stomach for a moment or two; but a little later I would feel hunger nudging my ribs, twisting my empty guts till they ached. I would grow dizzy and my vision would dim. I became less active in my play, and for the first time in my life I had to pause and think of what was happening to me. Which best describes why Wright includes this anecdote? a.to show how poverty shaped his behavior when he was youngerb. to vividly depict the hardships caused by oppression and segregation c.to realistically portray the struggles he endured as a child d.to provide an accurate account of the injustices he experienced as a youth. Help me answer these questions D. Directions: Write a feature article on a topic that interests you the most. Don't forget the four parts in writing a feature article. answer pls Why is it essential for SARS-CoV2 RNA be translated on ribosomes before it can be replicated? what is this please tell answer Visible light comes from which one of the sun's layers?O A. The radiative zoneB. The coronaC. The convection zoneD. The photosphereO E. The core _ _ _ i had a headache, I enjoyed the movie.(although/despite/however) Find the measure of TUA. 8B. 12C. 14D. 11