answersLogoWhite

0

private is when family and friends can communicate with you privately and public is when someone can look at what you say especially when your on facebook

User Avatar

Wiki User

12y ago

What else can I help you with?

Continue Learning about Computer Science

How does this access to media technology impact public life for people in these countries?

It opens democratic processes and public control of media.


What is an accurate description of an asymmetric encryption technology?

It is an encryption process that uses a public and private key pair to encrypt/decrypt data.


What happens if someone obtains your public key?

If someone obtains your public key, they can use it to encrypt messages intended for you, ensuring that only you can decrypt them with your corresponding private key. Additionally, they can verify your digital signatures, confirming the authenticity of messages you send. However, possessing your public key does not compromise your private key or your overall security, as the public key is designed to be shared openly. It's essential to keep your private key secure, as that is what protects your communications and identity.


What is a network that transfers private information securely over the Internet of other public network?

That is called a VPN - Virtual Private Network. The basic idea is that information is encrypted before it is sent over the public network.That is called a VPN - Virtual Private Network. The basic idea is that information is encrypted before it is sent over the public network.That is called a VPN - Virtual Private Network. The basic idea is that information is encrypted before it is sent over the public network.That is called a VPN - Virtual Private Network. The basic idea is that information is encrypted before it is sent over the public network.


In asymmetric encryption Both the sender and receiver have a private key and a shared private key?

No, both sender and receiver have a private key and a public key. It works like this: if you encrypt something with one key, you need the other to decrypt it. You give everyone a copy of your public key. When they want to send you something encrypted, they use your public key to send it. Only your private key can decrypt it, so no one else can read it. You don't give out your private key.

Related Questions

What effect has Communications technologyT had on private and public life?

Technology helps people communicate easier. For instance, cellphones allow people to communicate even when they are not at home or in the office.


Is Massachusetts Institute of Technology a public or private school?

Private school


A great advantage of a VPN is that it provides communications over networks?

A great advantage of a VPN is that it provides ____________ communications over _____________ networks.


Who is Safelayer Secure Communications?

Safelayer Secure Communications is a private communications company that was founded in 1999 in Barcelona, Spain. They develop software products on they Public Key infrastructure area.


Impact of information techonology on public administration?

whats new in information technology?


How does this access to media technology impact public life for people in these countries?

It opens democratic processes and public control of media.


What has the author Geert Dewulf written?

Geert Dewulf has written: 'Strategic issues in public-private partnerships' -- subject(s): TECHNOLOGY & ENGINEERING / Construction / General, Public-private sector cooperation


Does IPSec negotiate a secure encrypted communications link between a client and server through public and private encryption key management?

No it doesn't.


What does Martin Cooper like to do?

Martin Cooper, often regarded as the "father of the cell phone," enjoys sharing his passion for innovation and technology. He actively participates in public speaking engagements and lectures, discussing the impact of mobile communications on society. Additionally, he enjoys mentoring young entrepreneurs and engaging in discussions about the future of technology and telecommunications.


How is accounting is said to be political in nature by analysing public interest theory with private interest theory?

Accounting is political in nature as final information from accounting reports has impact on the general public, whether it be a public or private company.


What are the major sectors in society that influence science and technology?

government, private sector, general public and culture.


What are the low cost solutions to provide fast secure and reliable communications for mobile users?

A VPN, virtual private network, is a low cost solution to provide fast, secure and reliable communications for mobile users and geographically dispersed networks by utilizing the public communications infrastructure