1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Finger [1]
3 years ago
12

PLEASE HELP

Computers and Technology
2 answers:
timofeeve [1]3 years ago
8 0

Answer:

60

Explanation:

Because about 6 miles is 10 kilometers, multiply 10 kilometers by 10 to get 100 kilometers, multiply 6 by 10 to get 60

Anika [276]3 years ago
4 0

Answer: The answer would be 60 kilometers.

You might be interested in
How can you take a picture of work on here?????
Ronch [10]
If your on a computer then you can download a screenshot app if you dont already have one and all you do is simply screen shot your whole screen .and if it is on a tablet or phone there should be a screenshot button right there.
7 0
3 years ago
What is the recommended procedure for disconnecting an external hard drive to avoid losing data??
SpyIntel [72]
Go to files than click on USB file then do eject device before taking it out
6 0
3 years ago
Read 2 more answers
How do i install java runtime environment?
nlexa [21]
Just go to the internet and download the file and install
please mark as brainliest

3 0
3 years ago
It was stated that the inclusion of the salt in the UNIX password scheme increases the difficulty of guessing by a factor of 409
Furkat [3]

Answer: Explanation:

Salting alters the hash of a password so that it does not physically match the hash of another password. A salt and password are concatenated and processed with a cryptographic hash function. Salt prevents use of rainbow and hash tables to attacking and cracking passwords.

For example, a user has the password, "password000" and is put through a SHA1 hash. In the password database, all of the users with the password "password000" will have the exact same hash, because of the nature of hashing functions.  So, if an attacker breaches the database and brute force the password of the user mentioned above, he could look for all the hashes that match the original user's and would know their passwords are also "password000".

By applying a salt, the password hashes would no longer be identical to one another, even though the actual password is still the same. This requires the attacker to go in and attempt to brute force the second password (which has a different salt), even though it may be the same as the first.

In conclusion, it prevents an attacker from uncovering one password and subsequently uncovering multiple others.

4 0
3 years ago
(1)(50%) The program converts a three-ASCII-digit number to an 8-bit unsigned binary. For example, a 3-digit number as ‘0’ (=$30
MatroZZZ [7]

Answer:

Explanation:

3 - digit number                                             8 - bit binary

0 (=$30), 1 (=$31), & 8 (=$38)                          00010010

1 (=$31), 2 (=$32), & 9 (=$39)                          10000001

2 (=$32), 3(=$33), & 0 (=$40)                          11100110

2 (=$32), 4 (=$34), & 1 (=$41)                           11110001

2 (=$32), 5 (=$35), & 2 (=$42)                           11111100

2 (=$32), 5 (=$35), & 3 (=$ 43)                           11111101

2 (=$32), 5 (=$35), & 4 (=$44)                            11111110

2 (=$32), 5 (=$35), & 5 (=$45)                            11111111              

8 0
2 years ago
Other questions:
  • You can use Facebook's live feed tool to broadcast content as you post it
    8·2 answers
  • Write an application that allows a user to enter the names and birth dates of up to 10 friends. Continue to prompt the user for
    6·1 answer
  • A type of VPN connection, where a single computer logs into a remote network and becomes, for all intents and purposes, a member
    13·1 answer
  • What is the smartest person ever
    15·2 answers
  • "Na2SO3” represents sodium sulfite.
    13·2 answers
  • Which category does this fall in identity theft​
    6·1 answer
  • True or False: Nested elements must be indented with respect to parent elements in
    13·1 answer
  • I had about 83 GB before I installed Xcode, I was in the middle of the installation and reconsidered my decision but it's still
    7·2 answers
  • What are five types of applications you can create in Visual Basic 2017?
    12·2 answers
  • 6
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!