1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Schach [20]
3 years ago
14

Show the printout of the following code.

Computers and Technology
1 answer:
alexira [117]3 years ago
7 0

Answer:

E. 7.0

Explanation:

the 7 of the out of the older and make a shame of waves and force of trying

You might be interested in
What does spyware do on your computer?
Morgarella [4.7K]
It's a malware, and it basically let's the person/hacker/culprit get information off your computer without the owner of the computer knowing that the person is doing it. It's often used to find keystrokes, passwords, online interaction, and other personal data.
5 0
3 years ago
Series-connected 11-pF and 21-pF capacitors are placed in parallel with series-connected 22- pF and 30-pF capacitors. Determine
Naya [18.7K]

Answer:

19.9 pF

Explanation:

Given that:

Series connection :

11pF and 21pF

C1 = 11pF ; C2 = 21pF

Cseries = (C1*C2)/ C1 + C2

Cseries = (11 * 21) / (11 + 21)

Cseries = 7.21875 pF

C1 = 22pF ; C2 = 30pF

Cseries = (C1*C2)/ C1 + C2

Cseries = (22 * 30) / (22 + 30)

Cseries = 12.6923 pF

Equivalent capacitance is in parallel, thus,

7.21875pF + 12.6923 pF = 19.91105 pF

= 19.9 pF

8 0
3 years ago
What does UAS stand for
dezoksy [38]

Answer: Unmanned Aircraft Systems

Explanation:

8 0
3 years ago
Read 2 more answers
Identify the software in the computer that will receive and manage all interrupt signals.
vfiekz [6]

Answer:

cookies

Explanation:

3 0
2 years ago
a. The DES algorithm is based on the idea of the Feistel cipher. Explain how the Feistel cipher structure achieves substitution
madam [21]

Answer:

a. Feistel Cipher is basically a design model used in many block encryption algorithms one of them is DES. The Feistel structure has many rounds of substitution followed by permutation. In each round the plaintext is processed.

A Feistel Cipher comprise of;

1. Divide plaintext block into two parts

2. Perform multiple rounds of

a. Substitution on left half

b. Permutation by swapping halves

See attachment for the diagram of a feistel cipher.

B.

The concept of confusion and diffusion were identified by Claude Shannon in his paper Communication Theory of Secrecy Systems, published in 1949.

According to Shannon's definitions,

-Confusion means, making the relationship between the ciphertext and the key as complex and involved as possible.

It basically hides the relationship between the cipher text and the key. This property makes it difficult to find the key even tough there are many plaintext cipher text pairs created using the same key.

Diffusion is property that the non-uniformity which is much harder to detect. The distribution of the individual and pairs of neighbouring letters in the plaintext should be redistributed into the non-uniformity in the distribution of much larger structures of the ciphertext. The concept behind diffusion is to hide the relationship between the plaintext and the ciphertext. A cipher with good diffusion, should make sure that even if one bit in plaintext changes, then the ciphertext should change completely, in a manner such that its unpredictable.

Both Confusion and diffusion prevents the deduction of encryption key difficult. As a result this protects the original message or plaintext. Confusion and diffusion can be achieved using substitution and permutation.

Encryption methods use the principles of confusion and diffusion.

Confusion does the work of changing the data drastically from input to output by many ways like translate the data using a non-linear table created from the key.

Diffusion is used in encryption to make every bit of input affect every bit of the output which in tun makes the analysis difficult.

8 0
3 years ago
Read 2 more answers
Other questions:
  • "a terminal has two input queues." as a user types each character to the terminal, it is collected in the ____ queue.
    5·1 answer
  • An unwanted 'explosion' of inbox messages is called​
    8·2 answers
  • Extend to also calculate and output the number of 1 gallon cans needed to paint the wal. Hint: Use a math function to round up t
    12·1 answer
  • Which of the following comments are correct? Select all that apply.
    14·1 answer
  • Five plus six is equal to?​
    10·2 answers
  • You have been asked to advise a group of several universities who want to combine research efforts and store data in the cloud.
    9·1 answer
  • I WILL MARK BRAINIEST FOR THIS!!!!!!
    11·2 answers
  • How to count the total number of users from backend reactjs.
    6·1 answer
  • What can be used to help diagnose and fix computer hardware problems?
    8·1 answer
  • Frequently used _____________ can be saved as _____________ for use in analysis, dashboards, reports, tickets, and alerts.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!