1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
blondinia [14]
3 years ago
6

C2.5 - A group of four pirates has a treasure chest and one unique lock and key for each pirate. Using hardware that is probably

already lying around their ship, they want to protect the chest so that any subset of three of these pirates can open the chest using their respective locks and keys, but no two pirates can. How do they set this up?
Computers and Technology
1 answer:
slavikrds [6]3 years ago
3 0

Answer:

Explanation:

All the pirates uses their individual key and lock for the locking down of each the four sides of the lid of to the chest. Among the pirates, if three of them decides to open their latches, they can be able to lift the top by essentially using the fourth (locked) latch as a hinge to open the top. (We have several solutions or ways to do this.)

You might be interested in
g What field in the IPv4 datagram header can be used to ensure that a packet is forwarded through no more than N routers? When a
ad-work [718]

Answer:

a) Time to live field

b) Destination

c) Yes, they have two ip addresses.

d) 128 bits

e) 32 hexadecimal digits

Explanation:

a) the time to live field (TTL) indicates how long a packet can survive in a network and whether the packet should be discarded. The TTL is filled to limit the number of packets passing through N routers.

b) When a large datagram is fragmented into multiple smaller datagrams, they are reassembled at the destination into a single large datagram before beung passed to the next layer.

c) Yes, each router has a unique IP address that can be used to identify it. Each router has two IP addresses, each assigned to the wide area network interface and the local area network interface.

d) IPv6 addresses are represented by eight our characters hexadecimal numbers. Each hexadecimal number have 16 bits making a total of 128 bits (8 × 16)  

e) IPv6 address has 32 hexadecimal digits with 4 bits/hex digit

4 0
3 years ago
Click _______ to add a new column to a table.
Sophie [7]
The answer is Insert control B

5 0
4 years ago
Read 2 more answers
You need to write th java syntax for the expression “7 is greater than or equal to 3” choose the best answer
shtirl [24]
If(7>=3)
{
.
.
.
}
Mark as brainliest
8 0
4 years ago
Which letter is located at position (7,4) on this coordinate grid? A) B) C) D)
aleksklad [387]

It is letter d

gdstcccccccvdagjsbhbj cna cas

8 0
3 years ago
Which lossless image type is best suited for webpages but it’s not suitable to print
nexus9112 [7]

Answer:

I believe the answer you're looking for is "PNG"

Explanation:

6 0
3 years ago
Other questions:
  • Explain how you give users keyboard access to a text box
    6·1 answer
  • The initial step of the five-step problem-solving model is to: A. Explore alternatives B. Clarify values. C. Develop an approach
    9·1 answer
  • Of the listed principles, which one states that multiple changes made to computer systems shouldn’t be made simultaneously?
    9·1 answer
  • Calculate the average of a set of grades and count
    9·1 answer
  • You have been asked to create a query that will join the Production.Products table with the Production.Categories table. From th
    6·1 answer
  • Linux applications are developed using ________ programming language.
    7·1 answer
  • What is the bit pattern (raw binary) of the single precision representation of the decimal number 0.125 following IEEE 754 stand
    9·1 answer
  • Cycle for science and technology<br>​
    14·1 answer
  • How many combinations of 1s and Os can we make with 6 place values?
    12·1 answer
  • When spraying pesticide wear and protective eyeglass​
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!