A flashing encryption symbol or icon on the radio display during a conversation means: A. The other user is transmitting with a different encryption key B. The radio is receiving an updated encryption key C. The transmission received is encrypted or in the clear D. The radio is receiving an encrypted transmission

Answers

Answer 1

Answer:

i would believe its D

Explanation:

try to think about the question. encrypted stuff you wont be able to find, but if you can find it, an encrypted peice of data is being given to you.


Related Questions

Plant Roots are strong enough to break rock.


False


True

Answers

Answer:

True

Explanation:

Plants and animals can be agents of mechanical weathering. The seed of a tree may sprout in soil that has collected in a cracked rock. As the roots grow, they widen the cracks, eventually breaking the rock into pieces.

What is the difference between asset allocation and diversification

Answers

Answer:

Asset allocation refers to the percentage of stocks, bonds, and cash in your portfolio. In contrast, diversification describes the spreading of your assets across the various asset classes within each of those three allocation buckets to further reduce risk.

Explanation:

suggest any complete anime......?​

Answers

Plastic love and maybe your lie in April?

Software that communicates with the hardware and allows other programs to run. It is comprised of system software, or the fundamental files your computer needs to boot up and function. Every desktop computer, tablet and smartphone includes an operating system. Common desktop systems include Windows, OS X and Linux.

options:

Application Process


Boot Process


Computer Process


Operating Process

Answers

Answer:An operating system, or "OS," is software that communicates with the hardware and allows other programs to run. It is comprised of system software, or the fundamental files your computer needs to boot up and function.

Explanation:

Select the correct answer.

The local authorities indicate that a film crew shooting on an abandoned bridge need to have special permission. Which member of the crew is responsible for acquiring this permission?

A.

location manager

B.

producer

C.

director

D.

set designer

Answers

Location manager is a member of the film crew which is responsible for

getting permits from the police and relevant authorities.

The location manager is responsible for finding appropriate locations,

securing permits and giving notice to the neighbors to ensure the smooth

running of the film production.

In this scenario, the film crew known as the location manager will need to

take permission to shoot the movie on an abandoned bridge from the local

authorities.

Read more on https://brainly.com/question/19541645

what do other people think of e.t
in the movie E.T

Answers

Answer:

I think E.T is funny

Explanation:

If Maya wants to access a view that would control multiple slides within a presentation, which view should she utilize?

*it's A. Master view edg

Answers

Answer:

a. Master view

Explanation: is correct. post protected.

During this project, you will prepare a short business report. You will accomplish the following during this section of the project: Create a title page.
Type a summary, an introduction, and part of the main body.
Create a graph and a table.
Write the conclusions and recommendations.

Answers

Answer:

I can't tell you mine because that would be plagiarism but here's some ideas

Title Page. Every business report should feature a title page. ...

Summary. ...

Table of Contents. ...

Introduction. ...

Methods and Findings. ...

Conclusions and Recommendations. ...

References. ...

Appendices (If Applicable)

Explanation: Hope this helps:)

a packet analyzer is a program that can enable a hacker to do all of the following except ________.

Answers

A packet analyzer is a computer network that has the ability to intercept and log traffic that flows through the network of a computer. A packet analyzer is a program that can enable a hacker to do all of the following except;

D) Launch a denial of service (DoS) attack on your computer

Since it is able to read and capture the raw data moving through a network, hackers can use a packet analyzer to decode the details in a user's debit card.

Identity theft can be executed and passwords can be captured using this program.

However, the computer's network cannot be shut down with this program. Therefore, option D is right.

Options:

A) Use your debit card information to purchase items illegally

B) Assume your identity

C) Steal your logons and passwords for various accounts

D) Launch a denial of service (DoS) attack on your computer

Learn more here:

https://brainly.com/question/14390016

Why is this happening when I already uploaded files to my drive?

Answers

Answer:

u have to upload it to your drive first

Explanation:

What is the output of the following program? (Show your work)

int x = 3, y = 2;
System.out.println("x = " + y);

x = 5 + y * 7 % 3;


y = x - y * x - 3 / 2;


System.out.println("x = " + x);
System.out.println("y = " + y);

Answers

Answer:

x = 2

x = 7

y = -8

Explanation:

int x = 3; (here the variable of type int called x is declared and given the value 3)

int y = 2; (here another variable of type int called y is declared and given the value 2;

System.out.println("x = " +y ); (this instruction will print the value of y in the console terminal but deceivingly saying that the value belongs to x variable. So whoever reads will read "x = 2" instead of "x = 3" which would be the correct value associated with x.

x = 5 + y * 7 % 3; (here the value of x is changed from 3 to 5 + y * 7 % 3. What this means is that the first value of y (2) is multiplied by 7 and then get the mod of division 14 / 3 which is 2. Then added to 5. So the final result is 7 which is now the new value of x)

y = x - y * x - 3 / 2 (same as the above but for the value of y: here - 2 is multiplied by 7 and - 3 is divided by 2. Now we have 7 - 14 - 1.5 which is -8.5 but since you specified the variable type was an int and not double or float, then the program ignores significant numbers, so it ignores the .5 or whatever comes after the point instead of rounding it. PS: [So for instance if the result was 8.9, the value printed would be 8])

System.out.println("x = " + x); (prints the new value of x but this time it does not deceive the reader)

System.out.println("y = " + y); (prints the new value of y, and the letter y is shown in the screen for the first time with the correct value associated)

True or False!
Answer​

Answers

Answer:

1) true

2) true

3) false, domain name, not domain name suffix.

4) true

5) true

6) true

7) true

8) false, ... forgot the other name ...

9) true

10) false, it can also contain pics and vids.

11) true

12) true

13) false, ... can't remember the name ...

14) true

15) true

Any information that is processed by and sent out from a computer or other electronic device is considered __________.

options:

Input


Processing


Storage


Output

Answers

Esay Thant’s an output

A criminal is using software to obtain information about the computer of a user. What is the name of this type of software

Answers

Answer:

spyware

Explanation:

Laura is confused with the spelling of the word pronunciation. She types the word as pronounciation. Which feature of the Autocorrect tool should she use, so that the word processor automatically corrects it? PLS HELP!!!

Answers

The right answer is “replace”

An organizations help desk is flooded with phone calls from users stating they can no longer access certain websites.
The help desk escalates the issue to the security team, as these websites were accessible the previous day.
The security analysts run the following command: ipconfig /flushdns, but the issue persists. Finally, an analyst changes the DNS server for an impacted machine, and the issue goes away.
Which of the following attacks MOST likely occurred on the original DNS server?[...]
a. DNS cache poisoning
b. Domain hijacking
c. Distributed denial-of-service
d. DNS tunneling

Answers

The distributed denial-of-service (DDoS) attack is known to be a malicious  attack. Distributed denial-of-service attacks can mostly likely occurred on the original DNS server.

Distributed denial-of-service often tires to hinder the normal traffic of the said targeted server, service or network by filling up the target or its environment/ infrastructure with a flood of Internet trash.

The symptom of a DDoS attack is that the site or service will suddenly run slow or become unavailable. Traffic analytics tools can help one to know  the signs of a DDoS attack. DDOS attack can be prevented by  switching DNS servers.

Learn more from

https://brainly.com/question/13977863

Digital photography occurred in what age?

Answers

Answer:

The history of digital photography as we know it began in the 1950s. In 1951, the first digital signals were saved to magnetic tape via the first video tape recorder. Six years later, in 1957, the first digital image was produced through a computer by Russell Kirsch.

Think about the different costs for magazine ads. Why do you think it would cost more to have an ad placed on the front or back of the magazine instead of having it inside?

Answers

People or businesses usually buy ads to promote what they’re trying to sell. Since the front and back of the magazine is what people see the most (rather than some random page on the inside), it is expected that an ad on one of the covers would cost more since those surfaces get many more viewers on average.

Hope this helps!

have you got a computer at home, school or work? what kind is it?how often do you use it? what do you use it for?what are the main components and features of your compuret system?

Answers

The answers to the computer system operations and components & features have been detailed below.

A computer is defined as an electronic device that is used for storing and processing data. Let's now answer the questions.;

A) Yes, I have a computer at work.

B) My computer at work is used to prepare documents and reports, send and receive emails, prepare drawings e.t.c.

C)The main components and features of my computer system are; The motherboard, The central processing unit (CPU), The video card which is the graphics processing unit (GPU), A volatile memory which is known as the Random Access Memory (RAM), Storage device such as Solid State Drive (SSD) or Hard Disk Drive (HDD)

Read more at; https://brainly.com/question/10946449

What is a definition of a two-tier lan network design?

Answers

access,distribution and core layers collapsed into one tier

Do you think Apple will eventually meet their goal of becoming a replacement for a physical wallet

Answers

Yes they are the leading tech innovators of the 21st century and have already made massive strides in this direction

Which statement is true with respect to Java?

A.
Java programs are not compiled, only interpreted.

B.
Intermediate bytecode is created by the JIT.

C.
Bytecode is platform independent.

D.
The JVM creates object code after compiling.

Answers

Java is a high level programming language.

The true statement is (c) Bytecode is platform independent.

First, java programs are compiled and interpreted

This means that (a) is not true

Secondly Just-In-Time (JIT) does not create intermediate bytecodes, and Java virtual machine (JVM) does not create object codes.

However, java programs are compiled to an instruction set for the JVM; this instruction set is referred to as the byte code.

And the byte code is platform-independent.

Hence, the true option is (c)

Read more about java programming language at:

https://brainly.com/question/2266606

Answer:

C) Bytecode is platform independent

Explanation:

Just got it right on ASU

PLSS HELP ASAP ILL GIVE BRAINLIEST THANKS

Answers

second one i’m pretty sure

Activity Sheet 2
A.Illustrate how to create the object below using draw and modify commands.​

Answers

Answer:

Vjfxfffccvvvvvv

Explanation:

Hgvjhgxxgyjjbvccjkn Hugh bună vvvvhg un www buukbbchfcvbvc. Hggvhhvbhchgx

A two-dimensional array of ints with 4 rows, has been created and assigned to a2d. Write an expression whose value is the total number of ints that could be stored in the entire array.

Answers

Arrays are used to represent data in rows and columns

The expression that represents the number of int the array can store is 4c

From the question, we have:

The number of rows is given as: 4The number of columns is unknown; assume the number of columns to be c.

Also from the question, we understand that the array is of integer type.

So, the number (n) of int the array can store is the product of the rows and the columns

i.e.

[tex]\mathbf{n = Rows \times Column}[/tex]

So, we have:

[tex]\mathbf{n = 4\times c}[/tex]

Multiply

[tex]\mathbf{n = 4c}[/tex]

Hence, the expression that represents the number of int the array can store is 4c

Read more about arrays at:

https://brainly.com/question/14664712

Good things to keep track of about people in your Career Network include: a. contact information, including how to spell their name. b. how you came to know them (introduced by a friend, at a career fair, search on LinkedIn, etc.). c. notes about your last interaction and plans for your next interaction. d. only a and b above e. all of the above

Answers

Answer:

mi pareceres que es la B

Explanation:

Question 14 of 20
"Businesses around the world all need access to the same data, so there
needs to be one type of information system that is designed to offer it." Why
is this statement false?
O A. This statement is false because there already is only one type of
information system.
B. This statement is false because the data that the Internet
produces is never the same.
1
O C. This statement is false because different businesses have
different information needs.
O D. This statement is in fact correct; this is where the field of
information technology is heading.
SUBMIT

Answers

Answer:

This statement is false because there already is only one type of

information system.

Dom is a software developer who likes to tweak his computer's OS to make it work the way he wants it to. The OS he is most likely to use is _____.

A. Mac
B. Linux
C. MS-DOS
D. Windows

Answers

Answer:

Linux

Explanation:

Linux-based operating systems are open-source, and open-source software can be modified. Mac, MS-DOS, and Windows are all closed-source means we can't see the source code hence we can't modify it.

I hope this helps <3

Which type of computer is used at homes and school purposes

Answers

Answer:

Desktop

Explanation:

Question # 6
Fill in the Blank
Complete the following sentence.
The World Wide Web launched to the public in __________.

#Nova

Answers

Answer:

April 30, 1993

Explanation:

Other Questions
Data gathered on the shopping patterns during the months of April and May of high school students from Peanut Village revealed the following. 38% of students purchased a new pair of shorts (call this event H), 15% of students purchased a new pair of sunglasses (call this event G) and 6% of students purchased both a pair of short and a pair of sunglasses. Which of the following CANNOT be prevented? any five problems related to employ ment in nepal If 2m +1= 3m - 3, what is the value of m? What is your walking rate in steps per minute? what pattern do you noticed for each column What should you not do during a hostage rescue attempt? A skydiver jumps from an airplane that is moving at 50 meters per second at a height of 1,000 meters what describes the skydivers energy immediately after leaving the air plane You randomly select one card from a 52-card deck. Find the probability of selecting a black four or a black five. For the function: f(x) = 3x^2 4x 8, find and simplifyA. f(x) - f(a) divided by x-ab.f(x +h) - f(x) all divided by H The table shows the portions of copperRingPortion that is CopperRed gold25%Pink gold0.2Rose gold940Which ring has the highest portion of copper? What do you know about world war 2 A mouse runs 2 metres in 4 seconds. What is its speed? 10 +4m when m = -2i really need help on this lol Compare your response to the sample response above. What did you include in your explanation?a reference to the horizontal-line testa statement that the function is one-to-onethe conclusion that the inverse is a function The 4th grade class met their goal of reading of certain amount of hours during the fall. They earned their skiing trip this winter sponsored by the parent-Teacher organization. if each ski ticket costs $28 and there are 86 fourth grades, how much does PTO need to pay for the tickets? How are the General and Rainsford alike? While Dr. Andy operated, he thought of consecutive odd integers. His intensassuch that 4 times the sum of the first and fourth was 12 greater than 3 times themthe second and third. What were the first four integers on Dr. Andy's list? Match the correct function to the correct organelle.FunctionsOrganelleAllow substances to enter and leave the cell ___________VacuoleStore water or fluids __________RibosomePowerhouse of the cell _________Golgi BodiesProduce protein _________NucleusThe cell post office modify, sort and package protein __________Cell MembraneControl the life process of the cell __________Mitochondria Madisons dad use a hose to fill an infltable pool in the back yard