1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Jobisdone [24]
2 years ago
14

A film company want to video animals in the wild acting naturally. They decide to

Computers and Technology
1 answer:
erik [133]2 years ago
5 0

Answer:

y

Explanation:

g

You might be interested in
True or False: VLANs in cloud computing are most likely to be found on direct connections with a CSP.
elena-14-01-66 [18.8K]

Based on computing network operation, it is <u>false</u> that VLANs in cloud computing are most likely to be found on direct connections with a CSP.

<h3>What is VLAN?</h3>

VLAN is an acronym of Virtual Local Area Network that establishes its broadcast domain which enables network admins to combine hosts regardless the hosts are connected on the same network switch or not.

Given that the VLAN created its broadcast domain, you are likely not found it on direct connections with a CSP.

Hence, in this case, it is concluded that the correct answer is False.

Learn more about VLAN here: brainly.com/question/6769174

8 0
2 years ago
What is the basic difference between x.509 and pgp in terms of key hierarchy and key trust?
ra1l [238]
In terms of key hierarchy, you have to request to a Certification Authority in order for them to issue you an X.509 certificate. On the other hand, you can creat your own pgp.

In terms of key trust, X.509 supports only a sole key owner. It can support only one digital signature to confirm the key's validity. This does not work for pgp.
3 0
3 years ago
1st person to answer gets brainliest for free after 5 mins I wont be handing out brainliest
Dmitry [639]
What do we answer with?
7 0
3 years ago
When using presentation software, you can change the size of the text to
tatyana61 [14]
Decrease margin size.
5 0
3 years ago
Suppose Alice has a and Bob has b. Alice and Bob also share a secure communication channel. Chris wants to compute S = a ⊕ b. Al
finlep [7]

Answer:

This can be done by sharing some number b/w Alice and Bob.

Let a number c is shared b/w Alice and Bob.

c should not be shared with Chris.

Now, Alice can share (a xor c) with Chris but not to Bob.

Similarly, Bob can share (b xor c) with Chris but not to Alice.

So, Now Chris know (a xor c) and (b xor c).

Chris can calculate (a xor b) = (a xor c) xor ( b xor c).....

So Chris can calculate (a xor b) with satisfying all constraints.

6 0
4 years ago
Other questions:
  • What does the hard disk drive do?
    9·2 answers
  • PLEASE HURRY
    13·2 answers
  • What command limits structural changes, such as adding, deleting, or moving sheets, that can be made in a workbook?
    13·1 answer
  • You notice that it’s very easy to confuse medications at the community health center where you’re working. They are lined up on
    10·1 answer
  • What is the importance of computer application to statistics​
    6·1 answer
  • What is logical memory?
    15·1 answer
  • (3 points) Write a program to process two large chunks of data (e.g., a large 3D array and an array of self-defined structures w
    11·2 answers
  • Think about some of the most memorable and forgettable games ever created. They can be games that were
    15·1 answer
  • QUESTION 9 of 10: Bob charged $200 for a plane ticket last month. When he received his statement, he saw that he could pay the m
    12·2 answers
  • What is the output of the code below?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!