1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
34kurt
3 years ago
14

To prepare a list of the ten largest cities in Asia, Luke should most likely use data to

Computers and Technology
2 answers:
Vesna [10]3 years ago
7 0

Answer:

To prepare a list of the ten largest cities in Asia, Luke should use data to find more information about the population size of each city in Asia, he should put their landmasses into consideration too.

kakasveta [241]3 years ago
5 0
He should find answers about the population size hope this helps 
You might be interested in
Jim wants to buy a car, he’ll probably only need it for a couple of years he has a short commute to work so he won’t put many mi
Papessa [141]
Is there more information? or options?
4 0
3 years ago
Cindy visits her favorite website on a lunch break using a hospital computer. After she downloads a file, she notices that the c
TiliK225 [7]

<u>Explanation:</u>

<em>Remember, </em>Malware is a word coined from the words Malicious-Software (Mal...ware). Thus, Malware could be defined as software that is intentionally designed by cybercriminals to gain access or cause damage to a computer or network.

a. Cindy may learn the difference between these two techniques used to create a malware attack:

  • through downloads from malicious websites: An attacker may design a malicious website; in which unsuspecting users who visit the site may click to download certain files, but these are actually malware software been installed.
  • through malicious emails: This email may contain attachments which if opened or downloaded by an unsuspecting user would infect their computer with malware.

b. Here are some common suggestions;

  • Never open attachments from strange email addresses.
  • install a paid antivirus software.
  • be mindful of websites with too many ads.
4 0
3 years ago
Which block cipher mode of operating requires that both the message sender and receiver access a counter that computes a new val
ankoles [38]

There is block cipher kind of mode of operation. The block cipher mode of operating requires that both the message sender and receiver  is exchanged is the (CTR) Counter.

<h3>What is the Counter (CTR)?</h3>

This is known to be a common block cipher mode of operation. It often needs that both the message sender and receiver to have a kind of access a counter, that helps to computes a new value whenever a ciphertext block is been exchanged.

The disadvantage of CTR is known to be the fact that it needs a synchronous counter necessary for both the sender and receiver.

Learn more about  block cipher mode from

brainly.com/question/9979590

7 0
2 years ago
There are several categories of utility programs that were discussed in this unit. For this item, list one. In one to three sent
Zolol [24]

Answer:

Antivirus

Explanation:

The antivirus software is a utility program and what it basically does include: (1) detecting of virus on the computer system (2) bring to the notice of the computer user, the presence of virus on the system.

An example is Avast Antivirus.

6 0
3 years ago
A programmer, or software developer, is a person with the training and skills necessary to ____________ computer programs.
brilliants [131]
<span>A programmer, or software developer, is a person with the training and skills necessary to </span>write, program or develop computer programs.

6 0
3 years ago
Other questions:
  • Write the interface (.h file) of a class ContestResult containing: An data member winner of type string, initialized to the empt
    14·1 answer
  • The term ________ refers to the use of a single unifying device that handles media, internet, entertainment, and telephone needs
    13·1 answer
  • What is after Windows 8.1
    11·2 answers
  • High capacity circuits are limited by the least capable network link, which is typically the user connection. As such, it is imp
    11·1 answer
  • Which of the following statements is false? Question 4 options: By convention class names begin with an uppercase letter, and me
    8·2 answers
  • You're researching information about titanium bike frames. Which Web site is probably the least biased? The web site of a nation
    6·1 answer
  • Many businesses use robotic solutions. Which department of the food and beverage industry uses robotic solutions on a large scal
    10·2 answers
  • A descriptive study represents the highest level on the knowledge-level continuum.
    11·1 answer
  • Write code which takes two inputs from the user, a number of sides followed by a side length, then creates a regular polygon wit
    10·2 answers
  • Direction: Read each item carefully and choose the letter of the correct answer. Write your answers on a separate sheet of paper
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!