1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
d1i1m1o1n [39]
4 years ago
9

____ is high-quality encryption software that has become quite popular for creating secure e-mail messages and encrypting other

types of data files for average users.
Computers and Technology
1 answer:
Luden [163]4 years ago
4 0

Answer: PGP(Pretty Good Privacy)

Explanation: Pretty Good Privacy (PGP) is kind of a program that facilitates the operating system and other devices with the encryption and decryption with complexity so that decoding of message/data is not easy task. This feature protects the data from any unauthorized access to the mails, messages, files and other data.This maintains the security in the email transmission background and messages.

You might be interested in
Marisol manages the online advertising campaigns for a chain of toy stores with both a physical and an online presence. Which Go
tatiyna

Answer:

Marisol must make use of the Shopping campaign for showing the image of her products, as well as advertise her company's online as well as the local inventory of the toys, as well as boost the traffic to their site and the local toy stores. These types of ads are displayed on Google Shopping which comes just after the search results and near the responsive and text ads.

Explanation:

Please check the answer section.

8 0
3 years ago
Java uses ____ to implement method lookup.A) a jump tableB) an inheritance treeC) restricted accessD) polymorphism
sashaice [31]

Answer:

D) polymorphism

7 0
4 years ago
An app builder has created a report for sales people to view records from the custom object, some users have complained that the
Mila [183]

Answer:

There is a need for some people to see the total transparency of the records that are meant to be shared with a select group of people. There are certain things that can be done for this. The first one is that the sharing rules should be checked. To whom are the details shared with. The next one is the filters that are used.

These can be reported and changed accordingly. Lastly, the whole organization’s defaults can be checked. This is something that can be done when the previous methods that were done did not work that well. Once some changes are done, the people can check if they already work and if the records can be viewed.

Explanation:

8 0
3 years ago
Why does it still say I am ambitious whenever I have the 5 brainliest and almost 700 points?
Galina-37 [17]
Check below your score it should say something out of 5 you need to get more to get 5/5
8 0
3 years ago
Read 2 more answers
)1-bit sign, 8-bit exponent, 23-bit fraction and a bias of127 is used for ___________ Binary Floating PointRepresentation
Darina [25.2K]

Answer: Single  precision

Explanation:

A 1-bit sign, 8-bit exponent, 23-bit fraction and a bias of 127 is used for the single precision binary floating point representation. As, single precision is the smallest change that can be represented as floating point representation is called as precision. It is the computer format number, which occupies 32 bits in the computer memory.

The IEEE standard specify a binary 32 as:

Sign bit- 1 bit

Exponent width- 8 bits

Significant and precision- 24 bits (23 stored as explicitly)

7 0
3 years ago
Other questions:
  • If Mark is developing a website to be optimized for mobile devices, what would be the top-level domain?
    10·1 answer
  • [Submit on zyLabs] Please write a function with one input, a matrix, and one output, a matrix of the same size. The output matri
    10·1 answer
  • Write a SELECT statement that selects all of the columns for the catalog view that returns information about foreign keys. How m
    6·1 answer
  • Write a program that echos back any inputted integer greater than 1, and exits when a 0 is entered. Your program should use a co
    11·1 answer
  • Rose opens her software application and gets a message stating that she has only 16 more uses of the product available. Given th
    15·1 answer
  • When writing code, how can printing be useful?
    15·1 answer
  • It is where your cpu (processor) is installed
    10·2 answers
  • The notes added to slides can be seen during the presentation. TRUE OR FALSE​
    13·1 answer
  • List different examples of models​
    5·1 answer
  • Step of opening browser on computer​
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!