Answer:
true
false
true
true
Explanation:
I took the paper
¿Qué algoritmos de encriptación utilizan una clave para cifrar los datos y una clave diferente para descifrarlos?
Answer:
Asimétrica
Explanation:
Los algoritmos de encriptación sirven para que solo el destinariario y receptor de los datos logren acceder a la información, es decir que inmediatamente que es enviada la información, solo puede ser legible para quien tenga un código de acceso, al mismo quien envía necesita una clave diferente para enviar lo datos. es un algoritmo asimétrico porqué el emisor y el receptor usan claves diferentes de encriptación.
A device that connects to a network without the use of cables is said to be?
can you help me here please
Explanation:
1) ethiCal : he is a good person to be socialized .
unethical : he should not trust the people so easily that he have never met and gave the password to them
2) ethical: she is a good girl to login in time and kepp only respected points
unethical : she should have Ateach her friends that they should not fight and discuss the right answer correctly
The step-by-step procedure to solve any problem is called an
Answer:
Algorithm
Explanation:
Pre-writing is important for all of the following reasons except?
A) it gets ideas down on paper
B) it forces the writer to be specific early in the process
C) it is the creative stage
D) it is where the ideas are generated
Answer:
B) It forces the writer to be specific early in the process.
Explanation:
Pre-writing is simply just getting down ideas. If you're writing down specific details and information, that's when you're writing the rough draft or the finalized paper.
¿Cómo sobrevivirían las personas, sin gas, agua, luz, teléfono, ni internet?
Eles nao tinham Condiçoes de vida e sem a agua nao consiguem Sobreviver porque agua é tudo e a agua é metade da nossa vida
IT technicians are setting up a new file server for a school. Describe the benefits and
drawbacks of using a command line interface (CLI) rather than a graphical user interface
(GUI) to set up a new file server.
Answer:
The benefits of using the command line interface for setting up a file server are;
1) The command line interface (CLI) is faster than other interfaces and can easily handle tasks which are repeating such as creating folders for users on the server
2) The CLI requires less time for processing with the CPU, and it takes up less memory such that the file Server is not slowed down during the file setup process
3) The system resources required are few
The drawbacks are;
1) The CLI is confusing to those who are not exposed to programming as the commands the user needs to learn to before they can setup setup the new file server
2) The users needs to be very accurate in terms of spelling errors as that will lead to failure of the program, there are no spell check, and a mistype can lead to the entire coding process being restarted from the beginning
Explanation:
Two uses of mortise chisel
Answer:
Two uses of the mortise chisel are;
1) Mortise chisel are used for cutting across the grain of the wood directly and also
2) To lever waste materials out of the cut area and smoothen the cut area
Explanation:
A mortice is a recessed hole created in a part that is meant to accommodate a complementary projection part, which will enable the fastening of the two parts together
A mortise chisel are chisels used for the chopping out mortise joints, and are designed such that the heavy impact of a mallet
what is the most important/powerful computer in a typical network?
Answer:
A network server is a computer that provides various shared resources to workstations and other servers on a computer network. They are built with more powerful components than individual workstations
Are DoS and DDos tactics appropriate for legitimate organizations to use against others? What fallout is considered appropriate fallout should an attack be used on others? Explain your answer.
Answer:
They are inappropriate
fallouts: Access denial and data theft
Explanation:
Dos ( denial of service ) and DDos ( distributed denial of service ) are inappropriate for legitimate organizations to use against each other. because DOS or DDos attacks are attacks on the server of an organization by sending an unusual amount of traffic to the server, thereby denying the devices and users connected to the server access to the server.
Access denial and data theft are the fallouts associated with DOS and DDos attacks
what do you mean by professional education? explain with examples.
Answer:
prfesssional education is any programs that improve the knowledge,skills and attitudes.
Example include; educational course and training to become a teacher,nursing course,aeronautics engineering,etc.
To light up an LED, you need to connect the cathode leg to one of the Digital Pins and connect the Anode leg to the ……………. on the Arduino board.
Answer bobobobobobobobo
Harry makes pizzas to sell in his café. He buys packets of grated cheese and boxes of mushrooms and then uses them for the pizza toppings. For example, a bag of grated cheese is divided into 4 portions and used to top 4 pizzas. What formula is in cell D3?
Answer:
=B3 / 4
Explanation:
The price of a packet of grated cheese is $2.60. To make pizza, this packet of cheese is divided into four to make 1 pizza. Therefore, the price of the grated cheese used to make 1 pizza = price of packet of cheese / 4 = $2.60 / 4 = $0.65
This price is the price inserted in cell D3. The price for each packet of grated cheese is inserted in cell B3.
Therefore the formula used in cell D3 to find the price of each grated cheese required for one pizza is:
Formula for D3 is "=B3 / 4"
A Python keyword ______________.
can be user defined
cannot be used outside of its intended purpose
can only be used in the comments section
can be used anywhere in a Python program
Answer:
cannot be used outside of its intended purpose.
Explanation:
In many programming languages, keywords are special and reserved words that are used for specific and specified purposes. They have special meanings and cannot be used outside their intended purposes.
Keywords cannot be used as variable names, identifiers or functions.
In Python, some of such keywords include;
i. True
ii. False
iii. for
iv. while
v. break
vi. continue
vii. if
viii. else
ix. def
x. pass
What should Iris obtain from the client in order to display the work in her portfolio?
Answer:
depends on the laws of the country in which you are working
Explanation:
This is very vague and usually depends on the laws of the country in which you are working. In some cases, Iris would need permission from the client in order to display the work. In other cases, Iris would not need anything because she is the original creator of the content. This mostly depends on the laws of the country and whether or not a specific contract was created between Iris and the client, stating if the content rights where transferred or not.
Which of the following is the BEST example of the principle of least privilege? Correct Answer: Wanda has been given access to the files that she needs for her job. Correct Answer: Mary has been given access to all of the file servers. Correct Answer: Jill has been given access to all of the files on one server. Correct Answer: Lenny has been given access to files that he does not need for his job.
Answer: Wanda has been given access to the files that she needs for her job.
Explanation:
The principle of least privilege is when a user is only given the minimum level of permissions that he or she needs to perform a particular job function. This helps in reducing the risk of attackers having access to data.
The best example of the principle of least privilege is Wanda has been given access to the files that she needs for her job. Given access to all of the file servers or access to all of the files on one server is incorrect.
Answer:
Wanda
Explanation:
Reason being is that least privilege gets only the things you need for the job, nothing more or less.
what are the other way of getting website static
Answer:
Explanation: Jekyll. Jekyll is far and away the most popular static site generator. ...
Hexo. Hexo is a build tool created with nodeJS, which allows for super speedy rendering, even with extremely large sites
and Hugo
I hope this help =D
Answer:
Ten Static Website Generators
Jekyll. Jekyll is far and away the most popular static site generator. ...
Hexo. Hexo is a build tool created with nodeJS, which allows for super speedy rendering, even with extremely large sites. ...
Hugo. ...
Octopress. ...
Pelican. ...
Brunch. ...
Middleman. ...
Metalsmith.
An attacker has been successfully modifying the purchase price of items purchased at a web site. The security administrators verify the web server and Oracle database have not been compromised directly. They have also verified the IDS logs and found no attacks that could have caused this.
What is the mostly likely way the attacker has been able to modify the price?
A. By using SQL injection
B. By changing hidden form values in a local copy of the web page
C. By using cross site scripting
D. There is no way the attacker could do this without directly compromising either the web server or the database
can you help me here please
Explanation:
because Anna is a music lover she had download lots of songs.When downloading songs a virus should have gone from the websites to her computer.
to avoid this problems she should not have gone through the different websites
how do you simplify
[tex] \frac{ \sin(90 - \alpha ) \times \tan( - \alpha ) \times \cos( \alpha - 180) }{ \ \cos(100) \sin(135?) } [/tex]
Answer:
[tex]\dfrac{sin(90^{\circ} - \alpha) \times tan (-\alpha) \times cos(\alpha - 180^{\circ})}{cos(100^{\circ}) \times sin(135 ^{\circ})} = \dfrac{\sqrt{2} \times sin(2 \times \alpha) }{2 \times cos(100^{\circ}) }[/tex]
Explanation:
The given expression is presented as follows;
[tex]\dfrac{sin(90^{\circ} - \alpha) \times tan (-\alpha) \times cos(\alpha - 180^{\circ})}{cos(100^{\circ}) \times sin(135 ^{\circ})}[/tex]
The sine, cosine, and tangent of the common angles are given as follows;
sin(A - B) = sin(A)·cos(B) - cos(A)·sin(B)
∴ sin(90° - α) = sin(90°)·cos(α) - cos(90°)·sin(α) = cos(α)
tan(-α) = -tan(α)
cos(A - B) = cos(A)·cos(B) + sin(A)·sin(B)
∴ cos(α - 180°) = cos(α)·cos(180°) + sin(α)·sin(180°) = -cos(α)
sin(135°) = sin(90° + 45°) = sin(90°)·cos(45°) + sin(45°)·cos(90°) = cos(45°) = √2/2
Therefore, we get;
[tex]\dfrac{sin(90^{\circ} - \alpha) \times tan (-\alpha) \times -cos( 180^{\circ})}{cos(100^{\circ}) \times sin(135 ^{\circ})} = \dfrac{cos( \alpha) \times -tan (\alpha) \times -cos(\alpha )}{cos(100^{\circ}) \times \dfrac{\sqrt{2} }{2}}[/tex]
[tex]\dfrac{cos( \alpha) \times -\dfrac{sin(\alpha)}{cos(\alpha)} \times -cos(\alpha )}{cos(100^{\circ}) \times \dfrac{\sqrt{2} }{2}} = \dfrac{sin( \alpha) \times cos(\alpha )}{cos(100^{\circ}) \times \dfrac{\sqrt{2} }{2}} = \dfrac{2}{\sqrt{2} } \times \dfrac{sin( \alpha) \times cos(\alpha )}{cos(100^{\circ}) }[/tex]
[tex]\dfrac{2}{\sqrt{2} } \times \dfrac{sin( \alpha) \times cos(\alpha )}{cos(100^{\circ}) } = \dfrac{sin(2 \times \alpha) }{\sqrt{2} \times cos(100^{\circ}) }[/tex]
Therefore;
[tex]\dfrac{sin(90^{\circ} - \alpha) \times tan (-\alpha) \times cos(\alpha - 180^{\circ})}{cos(100^{\circ}) \times sin(135 ^{\circ})} = \dfrac{\sqrt{2} \times sin(2 \times \alpha) }{2 \times cos(100^{\circ}) }[/tex]
The cultivation in mountain areas, with their scattered plots of usable land at various altitudes with different climates, landscapes and little margin for mechanization, are managed by family farms in the most efficient and effective way.
Answer:
Mountain farming
Explanation:
Mountain farming is done in hilly areas of the mountains. It is mainly family farming. The mountain farming is mainly done in the mountains where the paddy fields are scattered and the limited use of the usable lands are available.
It is cultivated in different types of climatic conditions or landscapes with limited use of mechanization or machines. The mountain farming is maintained by the family farms in an effective way.
write an algorithm and draw a flowchart to count the digits present in the given integer.
Answer:
The algorithm is as follows:
Input number
count = 0
while(number not equal 0)
number = number / 10
count = count + 1
end
Print count
Explanation:
This gets input for the integer number
Input number
This initializes count of digits to 0
count = 0
The following loop is repeated while number is not 0
while(number not equal 0)
This performs integer division of the number by 10; the resulting division is saved in variable number
number = number / 10
The count variable is incremented by 1
count = count + 1
The loop ends here
end
This prints the count of integers
Print count
See attachment for flowchart
Name the function for output in python.
Answer:
We use the print() function to output data to the standard output device (screen). We can also output data to a file, but this will be discussed later. An example of its use is given below.
Answer:print()
Explanation:As said above. Print is what we use in python (:
(101101+10110) /110
101101-11001/101 please I need help
Answer:
000000000000000000000000000001111111111111111111
there are 2048bytes in4megabytes true or false
Answer:
FALSE IS THE ANSWER.
I HOPE IT IS HELPFUL
i have a question about Razer headsets. Is it possible to mix microphones? For example:
I have an "Electra V2" headset and microphone and I want to change it's microphone to Kraken.
Is it possible?
Answer:
In theory yes it is gonna be pretty hard but it is very possible
Steeler corporation is planning to sell 100,000 units for 2.00 per unit and will break even at this level of sales fixed expenses will be 75,000 what are the company's variable expenses per unit
Answer:
1.25 per unit
Explanation:
Number of units to sell = 100,000
Price per unit = 2
Fixed expense = 75000
At break even point :
Revenue = total expenses
Total expenses = fixed cost + variable cost
Let variable cost = x
Revenue = units to sell * price per unit
Revenue = 100,000 * 2 = 200,000
Hence,
Fixed cost + variable cost = Revenue
75000 + x = 200,000
x = 200, 000 - 75000
x = 125,000
Variable cost = 125,000
The variable expense per unit is thus :
Variable expense / number of units
125,000 / 100,000 = 1.25 per unit
What are the uses of DVD Ram
Answer:
Like ordinary random access memory (RAM), it can be repeatedly read, written to, and erased. Intended mostly for removable computer storage, DVD-RAM provides the capabilities of Rewriteable CD (CD-RW) - users can run programs from the discs, copy files to them and rewrite or delete them.
Write a HTML code for displaying the following
i need an answer urgently
Answer:
Following are the code to the given question:
Explanation:
<html>
<body>
<p align="center" >VOCATIONAL SUBJECT</p>
<table align="center" border="2">
<tr>
<td rowspan="2">YEAR</td>
<td colspan="5">Vocational course</td>
</tr>
<tr>
<td rowspan="1">IT</td>
<td rowspan="1">CS</td>
<td rowspan="1">EL</td>
</tr>
<tr>
<td colspan="1">2016</td>
<td colspan="1">66</td>
<td colspan="1">68</td>
<td colspan="1">60</td>
</tr>
<tr>
<td colspan="1">2017</td>
<td colspan="1">77</td>
<td colspan="1">78</td>
<td colspan="1">80</td>
</tr>
<tr>
<td colspan="1">2018</td>
<td colspan="1">60</td>
<td colspan="1">67</td>
<td colspan="1">70</td>
</tr>
</table>
</body>
</html>
It's usually easier to change the design of a photo album slide show A.after you've created the presentation. B.before you've created the presentation. C.before you've planned out the presentation. D.after you've planned out the presentation but before creating it.
Answer:
A. after you've created the presentation.
Explanation:
A power point presentation is defined as a presentation program where one can create any presentation or design any layout like the photo album slide show to present it to others.
Once the album is created in the PowerPoint, it can be changed by going to the slide show and editing the content of the photo album of the slide show. Thus it is easier to make any changes in the design of the photo album slide show after the presentation have been created.