1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
avanturin [10]
2 years ago
13

Hellpppppppppppppppp

Computers and Technology
2 answers:
mylen [45]2 years ago
8 0
What’s the issue? I don’t get it
jonny [76]2 years ago
6 0

Answer:

i can't see your problem

You might be interested in
Encryption that uses 16-character keys is known as ____. strong 128-bit encryption strong 256-bit encryption military-strength 5
allsm [11]

Answer: Strong 128-bit encryption.

Explanation: An individual character corresponds to 8 bits . So if there are 16 characters then,

16\times8=128 bits keys

This makes the 128 bit key encryption the strongest amongst all other options.It is strongest because it is almost impossible to decode the 128-character key  by any method e.g.-brute-force method.

Other options are incorrect because the characters given by the other bits are as follows:  {\frac{256}{8}=32 characters

                         {\frac{512}{8}=64 characters

                         {\frac{512}{8}=128 characters  

Thus, the strongest character key is of 128 bits. for cipher.

3 0
3 years ago
Which is a safe Internet behavior?
Westkost [7]
Don’t give out personal information
7 0
3 years ago
Which agency coordinates the internet's IP addressing and DNS systems?
german
ICANN is the agency which coordinates the internet's IP addressing and DNS systems.

ICANN stands for Internet Corporation for Assigned Names and Numbers. Aside from coordinating the Domain Name System (DNS) and Internet Protocol (IP) addresses, it also coordinates the technical protocol parameters of ARPA top level domain, Internet DNS root zone management (gTLD and ccTLD), allocates Internet number resources, and other services which will fulfill their vision of "one world, one Internet".

The performance of ICAANs services is all under a U.S Government contract.
4 0
3 years ago
Within a word processing program, predesigned files that have layout and some page elements already completed are called
dexar [7]

Answer:

I think it's B) templates

     

                   Sorry if it's wrong I'm not sure!!

Explanation:

4 0
3 years ago
A computer essentially takes input, processes it, and produces output. Which person developed a machine in the mid-1880s that ac
MakcuM [25]

Answer:

The answer to this question is given below in the explanation section. the correct answer is Herman Hollerith.

Explanation:

Charles Babbage (incorrect)

Charles Babbage considers the father of the digital computer. He was a mathematician, philosopher, inventor, and mechanical engineer, Babbage originated the concept of a digital programmable computer. But he died on 18 1, 1871. so, this option is not correct.

John William Mauchly (Incorrect)

John William Mauchly was an American physicist who, along with J. Presper Eckert, designed ENIAC, the first general purpose electronic digital computer, as well as EDVAC, BINAC and UNIVAC I, the first commercial computer made in the United States. But John William Mauchy born on August 30, 1907 and died on January 8, 1980. So, this option is not correct.

Sir John Ambrose Fleming (Incorrect)

Sir John Ambrose Fleming was an English electrical engineer and physicist who invented the first thermionic valve or vacuum tube, designed the radio transmitter with which the first transatlantic radio transmission was made, and also established the right-hand rule used in physics.

Herman Hollerith (correct)      

Herman Hollerith was an American businessman, inventor, and statistician who developed an electromechanical tabulating machine for punched cards to assist in summarizing information and, later, in accounting. This machine is patented in 1884.

7 0
3 years ago
Other questions:
  • Jim has entered the age of each of his classmates in cells A1 through A65 of a spreadsheet. Which function should Jim use to fin
    11·2 answers
  • Which protocol can be used to send ipv6 packets over an ipv4 network?
    5·1 answer
  • Jane is debugging a code consisting of 25 lines. The code starts executing at line 11. At line 13, the code calls another method
    10·2 answers
  • An air-conditioning system's automatic controller might directly control the
    7·2 answers
  • What do you think of my profile picture
    8·2 answers
  • Which statement is NOT a rule for the data source for the mail merge?
    13·2 answers
  • Write a program with a method computeCommission which takes a double that is the salesAmount and returns the commissions for sal
    9·1 answer
  • Although some families have more resources than other families, there is always a limited amount of resources that families have
    15·2 answers
  • If you face an investigation where dangerous substances might be around, you may need to obtain which of the following?
    13·2 answers
  • In the list [0, 13, 5.4, "integer"], which element is at index 2?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!