1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
victus00 [196]
3 years ago
12

A programming language is used to tell a computer what to do to solve a problem?

Computers and Technology
1 answer:
goldfiish [28.3K]3 years ago
5 0
As far as humans are concerned. What's written in the programming language needs to interpreted or compiled into something that the machine can actually deal with.
You might be interested in
Can you help please.
liberstina [14]
1. true
2.false
3.true
4. many - I'm not too certain of this answer
5. track changes
3 0
3 years ago
Write six causes of data lost
just olya [345]
<span>1. Deleting files accidentally
</span>

2. Viruses and damaging malware

3. Mechanical damages of hard drive

4. Power failures

5. Theft of computer

6. Spilling coffee, and other water damages

7. Fire accidents and explosions

<span>Hope this helps.</span>
3 0
3 years ago
true or false? in a known-plaintext attack (kpa), the cryptanalyst hs access only to a segment of encrpted data and has no choic
bulgar [2K]

Yes , it’s true. In a known-plaintext attack (kpa), the cryptanalyst can only view a small portion of encrypted data, and he or she has no control over what that data might be.

The attacker also has access to one or more pairs of plaintext/ciphertext in a Known Plaintext Attack (KPA). Specifically, consider the scenario where key and plaintext were used to derive the ciphertext (either of which the attacker is trying to find). The attacker is also aware of what are the locations of the output from key encrypting. That is, the assailant is aware of a pair. They might be familiar with further pairings (obtained with the same key).

A straightforward illustration would be if the unencrypted messages had a set expiration date after which they would become publicly available. such as the location of a planned public event. The coordinates are encrypted and kept secret prior to the event. But when the incident occurs, the attacker has discovered the value of the coordinates /plaintext while the coordinates were decrypted (without knowing the key).

In general, a cipher is easier to break the more plaintext/ciphertext pairs that are known.

To learn more about Plaintext Attack click here:

brainly.com/question/28445346

#SPJ4

6 0
1 year ago
Consider a hard disk with the following specifications :<br> 3.5 in diameter
AnnyKZ [126]

Answer:

usable capacity = 10 GB

Number of cylinders = 256

Block size = 4 KB

(1)Bytes in each cylinder = (10*230)/(256) = (10*222) = 40 MegaBytes

(2)Number of Blocks in each cylinder = (10*222)/(212) = 10K

(3)capacity of one track = 40 MegaBytes/(10*2) = 2 MB

Rotation speed = 3840 RPM

Number of rotations per second = 3840/60 = 64

Transfer rate = (2*64) = 128 MB/sec

Explanation:

6 0
3 years ago
The function below tries to create a list of integers by reading them from a file. The file is expected to have a single integer
Setler [38]

Answer:

Check the explanation

Explanation:

def get_list_of_integers_from_file(filename):

int_list=[]

for line in open(filename).readlines():

try:

int_list.append(int(line))

except:

continue

return int_list

print(get_list_of_integers_from_file('file.txt'))

 

File.txt:

Kindly check the output below.

4 0
3 years ago
Other questions:
  • Word offers a multitude of picture formatting options that allow you to flip, rotate, and make many other adjustments to inserte
    15·1 answer
  • How do computers perform complicated tasks built from simple instructions?
    14·1 answer
  • You asked your colleague to provide feedback on a blog post you recently wrote. When they sent you their feedback, they made edi
    10·1 answer
  • How does kinetic energy affect the stopping distance of a small vehicle compared to a large vehicle?
    14·2 answers
  • _____ is a form of witty, amusing speech that is often used to bring people together.
    7·2 answers
  • Search engines use indexes created by web _________ to provide fast searches.
    7·1 answer
  • Identify and discuss the seven layers of the Open System Interconnection (OSI) model and their importance on TCP/IP operation.
    7·1 answer
  • What is the output of this program?
    10·2 answers
  • Write a program that: Takes the list lotsOfNumbers and uses a loop to find the sum of all of the odd numbers in the list (hint:
    5·1 answer
  • What variation pairs a new employee with an employee who has been with the company for 20 years?
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!