1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lostsunrise [7]
2 years ago
8

What technology uses mathematical algorithms to render information unreadable to those lacking the required key

Computers and Technology
1 answer:
hoa [83]2 years ago
6 0

Data encryption is the name of the technology that uses mathematical algorithms to render information unreadable to those lacking the required key.

<h3>What is Data encryption technology?</h3>

This is a technology that helps to secure data by applying a technique known as cryptography. What this basically means is that a secret code (or key) is generated which would provide access to the cryptographically stored information, and failure to provide the correct key makes the data or information unreadable.

You can learn more about how data encryption works here brainly.com/question/9238983

#SPJ1

You might be interested in
Give the 16-bit 2's complement form of the following 8-bit 2's complement numbers: (a) OX94 (b) OXFF (c) OX23 (d) OXBCWhich of t
Korvikt [17]

Answer:

Answer is provided in the explanation section

Explanation:

Convert 8-bit 2’s complement form into 16-bit 2’s complement form.

First write value in binary then check for 8 th bit value. If it is positive the upper 8 bits will  be zero otherwise will be 1s.

8-bit number   Binary of number    Insert 8 bits                  16-bit number

0X94                1001-0100                 1111-1111-1001-0100            0XFF94

0XFF                1111-1111                       1111-1111-1111-1111                 0XFFFF

0X23                0010-0011                 0000-0000-0010-0011    0X0023

0XBC               1011-1100                    1111-1111-1011-1100              0XFFBC

Which of the following 16-bit 2’s complement form can be shortened to 8-bits?

16-bit number        8-bit number

0X00BA                  0XBA

0XFF94                   MSB bits are not zero so we can’t  truncate it to 8-bit No

0X0024                  0X24

0XFF3C                   MSB bits are not zero so we can’t  truncate it to 8-bit No

4 0
3 years ago
What read a page on website​
katovenus [111]

Answer:

Dino

Explanation:

3 0
3 years ago
Write the definitions of two classes Day and Night. Both classes have no constructors, methods or instance variables. Note: For
Colt1911 [192]

Answer:

class Day

{

}  

class Night

{

}

Explanation:

Given

Two classes named: Day and Night

Requirement: Both classes have no constructors, methods or instance variables. should not be declared using the public visibility modifier.

The syntax to define a class in object oriented programming is

modifier class classname {

 // Constructor

 constructor(variablename) { ......}

 // Methods

 methods() { ... }

 ...

}

Access modifiers (or access specifiers) are keywords in object-oriented languages that set the accessibility of classes, methods, and other members. Examples are private, public, protected, etc.

Going by the syntax above to define class Day

Day

private class Day{

 // Constructor

 constructor(duration)

{

this.duration = duration;

}

 // Methods

CalculateDate() { ... }

}

But the question states that both classes have no constructors, methods or instance variables. should not be declared using the public visibility modifier.

So, class Day will be defined as follows

class Day

{

}

It could also be declared using visibility modifiers other than public modifier.  So, class Day will be defined as follows

private class Day

{

}

and

protected class Day

{

}

Similarly, class Night can be defined as follows

class Night

{

}

private class Night

{

}

and

protected class Night

{

}

4 0
3 years ago
Print Job Cost Calculator (10 points)
Ad libitum [116K]

Answer: Provided in the explanation section

Explanation:

Provided is the code  to run this program

Source Code:

import java.util.Scanner;

class PrintJobCost

{

  public static void main(String[] args) {

      Scanner input=new Scanner(System.in);

      System.out.print("Enter print job info:");

      String info=input.nextLine();

      String size="",type="";

      int count=0,i=0,len=info.length();

      double cost=0.0;

      while(info.charAt(i)!=' '){

          size=size+info.charAt(i);  

          i++;

      }

      i++;

      while(info.charAt(i)!=' '){

          type=type+info.charAt(i);

          i++;

      }

      i++;

      while(i<len){

          count=count*10+Integer.parseInt(String.valueOf(info.charAt(i)));

          i++;

      }

      if(size.equals("Letter"))

          cost=cost+0.05;

      else if(size.equals("Legal"))

          cost=cost+0.06;

      else if(size.equals("A4"))

          cost=cost+0.055;

      else if(size.equals("A5"))

          cost=cost+0.04;

      if(type.equals("Grayscale"))

          cost=cost+0.01;

      else if(type.equals("Colored"))

          cost=cost+0.10;

      cost=cost*count;

      System.out.printf("print job Cost:$ %.2f\n",cost);

  }

}

cheers i hope this helped !!!

8 0
4 years ago
Wich is the correct process for selecting an entire row in a spreadsheet?
umka21 [38]
CTRL - (select sentence) - ALT

4 0
3 years ago
Other questions:
  • What are the main types of software? Explain with appropriate examplesWhat are the main types of software? Explain with appropri
    12·2 answers
  • "The OSI model has seven layers and the DoD has four. At which layer does SMTP works in both models"?
    15·1 answer
  • What are options in the Advanced tab in the Share Workbook dialog box? Check all that apply
    14·2 answers
  • Do you think an employer can accurately judge an applicant’s skills and character by reviewing his/her job application? Why or w
    14·1 answer
  • All of the following are aspects of the search process except?
    5·2 answers
  • How can volunteering to help plan a fundraiser for your team or club be a way
    7·1 answer
  • During which phase of film making does the team outline their vision for the film?
    5·1 answer
  • If you have an equipment failure while driving on an expressway, you should
    8·1 answer
  • After reading through the code, what will happen when you click run?​
    13·1 answer
  • Which computer are used by mobile employees such as meter readers.​
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!