answersLogoWhite

0

When data is received by the receiver , receiver send an acknowledgement. After receiving the acknowledgement from receiver , senders knows the message has been successfully sent.

User Avatar

Wiki User

10y ago

What else can I help you with?

Related Questions

How does symmetric key encryption work?

Symmetric encryption requires that both parties (sender and receiver) know and have the exact same encryption key. This key is used both for encrypting and decrypting the data. Using the same encryption algorithm means that only those individuals that know or have the same key will be able to read any messages encrypted by the symmetric key.


What data is encrypted using a single key that only the sender and the recriver know?

The data itself does not matter in this scenario. The type of encryption used is symmetric encryption, meaning that the sender and receiver have the same key to lock and unlock the data.


To accurately transmit an electronic message the sender needs to know one code and the receiver needs to know a different one. what online security measure is being used?

It is the Public Key Encryption. A user using the Public Key Encryption has to have both a private key and a public key to send a secured message. The private key is used to unlock both a private and a public key encryption. A public key cannot unlock a private encryption.


Which party bears more responsibility in the communication process Sender Receiver Or both?

The sender is ALWAYS responsible for the communication. Furthermore the sender is responsible for getting feedback describing the communication, not just did the receiver hear it, to be sure the communication was received. Why is this? The receiver does not know what it is the sender is trying to communicate or if it was communicated accurately. Only the sender can possible know unless the receiver is a mind reader...


How do you know in gmail the recevier open our mail or not?

The mails that you receive are either read or unread. We can easily know the difference. The unread mails are highlighted and the normal ones are not.


What real-life situations are prime numbers used?

Large prime numbers are used in encryption. The larger the primes, the better the encryption. Typically each of two people will provide a prime; you need to know both prime numbers to decrypt. A program is used to calculate the values to be sent. The message is sent along with the product of the primes (sender's prime * receiver's prime). Since the number will be large it is difficult to crack (again, larger the better). To decrypt you have to know both prime numbers. Knowing one and the product makes it easy (just divide). If you only have the product, decrypting can be very time-consuming as you are forced to find the factors of the number


Who is certified sender 32896?

We can't know the answer to your question.


What are the responsibilities of the speaker and the receiver in the communication process?

The sender is ALWAYS responsible for the communication. Furthermore the sender is responsible for getting feedback describing the communication, not just did the receiver hear it, to be sure the communication was received. Why is this? The receiver does not know what it is the sender is trying to communicate or if it was communicated accurately. Only the sender can possible know unless the receiver is a mind reader...


How do I open an .exe file when McAfee doesn't allow it because it is a potential Virus. I know it is not because I know the sender. How do I bypass this?

It's probably a virus. The virus probably sent itself from the sender.


What are the roles of the sender in business communication?

i dont know ask goerge fergirson he should know.


What is symmetric and asymmetric?

From another user: Symmetric cryptography uses the same secret (private) key to encrypt and decrypt its data whereas asymmetric uses both a public and private key. Symmetric requires that the secret key be known by the party encrypting the data and the party decrypting the data. Asymmetric allows for distribution of your public key to anyone with which they can encrypt the data they want to send securely and then it can only be decoded by the person having the private key. This eliminates the need of having to give someone the secret key (as with symmetric encryption) and risk having it compromised. The issue with asymmetric is that it is about 1000 times slower than symmetric encryption which makes it impractical when trying to encrypt large amounts of data. Also to get the same security strength as symmetric, asymmetric must use strong a stronger key than symmetric.


How successful have hackers been at trying to break the DRM encryption?

I don't know! soz