Skip to main content

Posts

Featured

E-COMMERCE AND CYBER SECURITY

1) Distinguish : Private and Public key Ans:- In Cryptography, a public key is a large numerical value that is used to encryptdata. The key can be generated by a software program, but more often, it is provided by a trusted, designated authority and made available to everyone through a publicly accessible repository or directory In Cryptography, a private key (secret key) is a variable that is used with an algorithm to encrypt and decrypt code. Quality encryption always follows a fundamental rule: the algorithm doesn't need to be kept secret, but the key does. Private keys play important roles in both symmetric and asymmetric cryptography. 2) what is hacking Ans:- Hacking is identifying weakness in computer systems or networks to exploit its weaknesses to gain access. Example of Hacking: Using password cracking algorithm to gain access to a system 3) what do you mean by e-co summer Ans:- An individual who buys products or services for personal use and not for manufactu...

Latest Posts

Computer Graphics New

Download my Application

Download reference book

Internel Paper solution for E-COMMERCE

Internel Paper Solution For Computer Graphics

Computer Graphics and e-commerce Internel Paper

Assignment