1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
IgorC [24]
3 years ago
9

What term is used to describe a function that uses an algorithm to convert an input of letters and numbers into an encrypted out

put of a fixed length?
Computers and Technology
1 answer:
IgorLugansk [536]3 years ago
5 0

Answer:

tybheqjbeq

Explanation:

whfygqqqbhjywhdabsdbadjasdas

You might be interested in
Which of these is NOT a benefit of being connected 24/7?
Serjik [45]

Answer:

c

Explanation:

answering messages is a more of a choice than a benifit.

3 0
3 years ago
A network technician is planning to update the firmware on a router on the network. The technician has downloaded the file from
zhenek [66]

Answer: B. Perform a hash on the file for comparison with the vendor’s hash.

Explanation:

Before installing the firmware update, the step that the technician should perform to ensure file integrity is to perform a hash on the file for comparison with the vendor’s hash.

Hashing refers to the algorithm that is used for the calculation of a string value from a file. Hashes are helpful in the identification of a threat on a machine and when a user wants to query the network for the existence of a certain file.

5 0
3 years ago
In a bubble sort for a list of length n >= 2, in each iteration, the first step is to compare_______.
Hunter-Best [27]

Answer:

the consecutive two elements and swap them based on the value which is larger if we go for ascending order

Explanation:

bubble sort compares 2 consecutive elements of the list and swap them. in one iteration one value will be placed correctly depending on the sorting order either ascending or descending

7 0
3 years ago
Computers and technology<br> Help 10 Points!!!!
jonny [76]
Hi!

The answers are:
For the bookmark one, it is A. Below address bar
For the edge printing one, it is again A. Options
For the last one, it is C. Internet Explorer

-ASIAX ·<span>Frequent Answerer</span>
3 0
3 years ago
You areYou are a member of the application development organization for a small but rapidly growing software company that produc
bija089 [108]

Answer:

Following are the solution to this question:

Explanation:

Please find the complete question in the attached file.

It will obtain as much information about this matter as necessary even before the conference. It includes its gravity or probability of risk, various cases in the entire event, the possible solutions to the issues, as well as the consequences for parties involved in each potential answer, and Only at conferences, it may clarify to my boss that the explanation for the problem and also in details. It will be doing everything possible and try not to conceal the details but highlight the problem.

3 0
3 years ago
Other questions:
  • What must you do first in order to change the font type size and colour of a particular text
    13·2 answers
  • How might your use of computers and knowledge of technology systems affect your personal and professional success?
    7·2 answers
  • In a database, __________ is used to uniquely identify each record for retrieval or manipulation. answer an attribute or a field
    7·1 answer
  • A ____ operating system should be capable of supporting the applications and tools necessary to support Internet operations.
    10·1 answer
  • Blank includes websites that encourage interaction and connection among people ,business and organizations
    13·1 answer
  • Which aspect of design theory describes the relationship of one object to another in size? A.value B.form C.proportion D.tecture
    12·1 answer
  • Which of the following is a form of security protection that protects individual files by scrambling the contents in such a way
    14·1 answer
  • Part of preforming routine computer maintenance includes
    9·2 answers
  • John typed 545 words in 35 minutes, what is his typing speed
    8·2 answers
  • Most file managers include a way to create a folder through the save dialog box. true or false?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!