1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
WINSTONCH [101]
3 years ago
5

You would like to create a graph that shows how much of your total investments are in stocks, savings, and mutual funds. You sho

uld create a _____.
A. bar graph
B. pie graph
C. column graph
D. line graph
Computers and Technology
2 answers:
alexgriva [62]3 years ago
6 0
The Correct And Most Logical Answer is D) Line Graph
sdas [7]3 years ago
4 0
The answer is D. line graph
You might be interested in
What is a two content slide​
daser333 [38]

Answer:

Slide layouts define containers, positioning, and formatting for all of the content that appears on a slide. Placeholders are the containers in layouts that hold such content as text (including body text, bulleted lists, and titles), tables, charts, SmartArt graphics, movies, sounds, pictures, and clip art.

Explanation:

5 0
3 years ago
Which evaluation factor will be most important when choosing technology for the company
soldier1979 [14.2K]

Answer and Explanation:

Look for a company's latest updates, see what servers they use, check if they're using the latest technology like containers or AI and look for how flexible they are with regards to change and innovation.

7 0
3 years ago
Which two related organizations are responsible for managing the top-level domain name space and the root domain name system (dn
juin [17]

I guess the correct answers are,

IANA (Internet Assigned Numbers Authority)

ICANN (Internet Corporation for Assigned Names and Numbers)

Thе Intеrnеt Assignеd Numbеrs Authοrity (IANA) is a functiοn οf, a nοnprοfit privatе Amеrican cοrpοratiοn that οvеrsееs glοbal IP addrеss allοcatiοn, autοnοmοus systеm numbеr allοcatiοn, rοοt zοnе managеmеnt in thе Dοmain Namе Systеm (DNS), mеdia typеs, and οthеr Intеrnеt Prοtοcοl-rеlatеd symbοls and Intеrnеt numbеrs.

Thе Intеrnеt Cοrpοratiοn fοr Assignеd Namеs and Numbеrs (ICANN /ˈaɪkæn/ ЕYЕ-kan) is a nοnprοfit οrganizatiοn rеspοnsiblе fοr cοοrdinating thе maintеnancе and prοcеdurеs οf sеvеral databasеs rеlatеd tο thе namеspacеs and numеrical spacеs οf thеIntеrnеt, еnsuring thе nеtwοrk's stablе and sеcurе οpеratiοn.

6 0
3 years ago
What is Server Message Block (SMB) used for in Windows and can a hacker still damage a network using SMB?
Aleksandr [31]

Answer:

The absolute most decimating ransomware and Trojan malware variations rely upon vulnerabilities in the Windows Server Message Block (SMB) to proliferate through an association's system. Windows SMB is a convention utilized by PCs for record and printer sharing, just as for access to remote administrations.  

A fix was discharged by Microsoft for SMB vulnerabilities in March 2017, yet numerous associations and home clients have still not applied it. So now, the unpatched frameworks permit dangers that exploit these vulnerabilities inside, helping dynamic malware crusades spread like Californian rapidly spreading fire.  

SMB vulnerabilities have been so effective for danger entertainers that they've been utilized in the absolute most unmistakable ransomware episodes and refined Trojan assaults of the most recent two years. Truth be told, our item telemetry has recorded 5,315 discoveries of Emotet and 6,222 of TrickBot in business systems—two Trojan variations that are utilizing the SMB vulnerabilities—over the most recent 30 days alone.

7 0
3 years ago
Read 2 more answers
In this assignment you'll write a program that encrypts the alphabetic letters in a file using the Hill cipher where the Hill ma
mafiozo [28]

Answer: Provided in the explanation section

Explanation:

C++ Code

#include<iostream>

#include<fstream>

#include<string>

using namespace std;

// read plain text from file

void readPlaneText(char *file,char *txt,int &size){

  ifstream inp;

 

  inp.open(file);

 

  // index initialize to 0 for first character

 

  int index=0;

  char ch;

 

  if(!inp.fail()){

      // read each character from file  

      while(!inp.eof()){

          inp.get(ch);

          txt[index++]=ch;

      }

  }

 

  // size of message

  size=index-1;

}

// read key

int **readKey(char *file,int **key,int &size){

  ifstream ink;

 

  //

  ink.open(file);

      if(!ink.fail()){

         

          // read first line as size

      ink>>size;

     

      // create 2 d arry

      key=new int*[size];

     

      for(int i=0;i<size;i++){

          key[i]=new int[size];

      }

     

      // read data in 2d matrix

      for(int i=0;i<size;i++){

          for(int j=0;j<size;j++){

              ink>>key[i][j];

          }  

      }

  }

  return key;

}

// print message

void printText(string txt,char *msg,int size){

  cout<<txt<<":\n\n";

 

  for(int i=0;i<size;i++){

      cout<<msg[i];

  }

}

// print key

void printKey(int **key,int size){

  cout<<"\n\nKey matrix:\n\n";

  for(int i=0;i<size;i++){

      for(int j=0;j<size;j++){

          cout<<key[i][j]<<" ";

      }  

      cout<<endl;

  }

}

void encrypt(char *txt,int size,int **key,int kSize,char *ctxt){

  int *data=new int[kSize];

 

  for(int i=0;i<size;i=i+kSize){  

 

  // read key size concecutive data

      for(int a=0;a<kSize;a++){

          data[a]=txt[i+a]-'a';

      }

     

      // cipher operation

      for(int a=0;a<kSize;a++){

          int total=0;

          for(int b=0;b<kSize;b++){

              total+=key[a][b]*data[b];

          }  

          total=total%26;

          ctxt[i+a]=(char)('a'+total);

      }      

  }

}

int main(int argc,char **argv){

  char text[10000];

  char ctext[10000];

  int **key;

  int keySize;

  int size;

  // input

  key=readKey(argv[1],key,keySize);

  readPlaneText(argv[2],text,size);

  encrypt(text,size,key,keySize,ctext);

 

  // output

  printKey(key,keySize);

  cout<<endl<<endl;

  printText("Plaintext",text,size);

  cout<<endl<<endl;

  printText("Ciphertext",ctext,size);

 

  return 0;

}

cheers i hope this helped !!!

4 0
3 years ago
Other questions:
  • If you paste a word document text into an excel spreadsheet, the paste optio allow you to keep source formatting or
    9·1 answer
  • You will be administratively suspended if you have a breath or blood alcohol level of.... or above or refuse to submit to a chem
    12·1 answer
  • A network technician has created a network consisting of an external internet connection, a DMZ,
    14·1 answer
  • 1. Write a shell script, renumber.sh, that will rename all the files in a directory. The first argument is a base name, second a
    13·1 answer
  • Which workplace trend are outsourcing and telecommuting are examples of? Please select the best answer from the choices provided
    13·2 answers
  • It is believed that Taiwan is the original home of these early Oceania explorers. Maori Lapita Polynesians Aborigines
    13·2 answers
  • I think you have been doing a great job but you haven’t been signing many people up for our new service feature I want you to se
    8·1 answer
  • What is collaboration
    14·1 answer
  • A small business named Widgets, Inc. has hired you to evaluate their wireless network security practices. As you analyze their f
    13·1 answer
  • One of the users in your company is asking if he can install an app on his company-provided mobile device. The installation of a
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!