1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Triss [41]
3 years ago
5

Which scientific law states that if a light source radiates isotropically, the light intensity falls off the further you get fro

m the light
Computers and Technology
1 answer:
Diano4ka-milaya [45]3 years ago
4 0

Answer:

Explanation:

In photography and stage lighting, the inverse-square law is used to determine the "fall off" or the difference in illumination on a subject as it moves closer to or further from the light source.

You might be interested in
What would a match() property that passed the expression /^[0-9]/ check for?
lord [1]

Answer:

E

Explanation:

I took the test

7 0
2 years ago
Read 2 more answers
How to calculate 100MB at 56 Kbps to transfer time?
Gelneren [198K]
1MB=1000 kb 

\frac{100*1000Kb}{56Kb/s} ≈ 1748,71 seconds 


ransform in kilobyte and share knowing transfer time :)
3 0
3 years ago
If the contents of encrypted file1.nc and encrypted file3.nc are different, but the original file1 and file3 are the same, and y
Over [174]

Answer:

The Difference is because of the salt added to the password before hashing or encrypting it.

Explanation:

The Difference is because of the salt added to the password before hashing or encrypting it.

Salts are random data used to mention uniqueness. Suppose if two users have same password for the same system. By adding Salt to the password makes it unique in the crypto system. Its a added security layer which can safeguard the passwords or hashed data in the keystore or storage.

Salt can be prepended to the password or appended to the password.

Suppose the password is “stuti” then its SHA256 HASH value is <u><em>“4beb1eb6f438495eede7b14ac0d2b955636a49412cd4eb5714341f5716144954”</em></u>

So, if we add a salt with random string <em>brainlysalttest</em> then its SHA256 HASH value is <u><em>“5429e85778f1b9f493da637848f253dedf3edbfbb72782d43eb7337cee45ab0c”</em></u>

If we append the salt <em>brainlytestsalt</em> to the same password and hash it using SHA256 then its hash value is : <u><em>“3919b677d80ae0da2b58f70b464f6492670ccffee78cf52972c6983995ed8f52”</em></u>

So clearly Salting to the password and Hashing the salted password will make the difference and also unique.

3 0
3 years ago
DO NOW<br> 1. What are the 4 things that make a computer a<br> computer?
lana [24]

Answer:

CPU, GPU, Hard drive, Video Card

Explanation:

8 0
3 years ago
Write a program that uses two input statements to get two words as input. Then, print the words on one line separated by a space
nikitadnepr [17]

Answer:

Following is the C++ code for the question given :-

#include <iostream>

#include<string>

using namespace std;

int main() {

   string s1,s2;//two strings to store the words.

   cin>>s1;//Input statement.

   cin>>s2;//Input statement.

   cout<<s1<<" "<<s2<<endl;//printing both words in one line separated by space.

return 0;

}

Input:-

make

choices

Output:-

make choices

Explanation:

I have taken two strings two store two words.After taking the input I have printed both the strings which contains the words entered by the user separated by space.

6 0
2 years ago
Read 2 more answers
Other questions:
  • Blender questions
    8·1 answer
  • I'm curious why I would need to know this on a school learning site.
    12·1 answer
  • You are preparing to program a replacement system board, but the "system is booting in mpm mode" message is not displayed. what
    10·2 answers
  • William has an internet connection that does not allow him to make calls when connected to the internet. what internet service c
    7·2 answers
  • Application software (apps) includes all the programs that allow you to perform specific tasks or applications on a computer. In
    6·1 answer
  • There is usually a positive side and a negative side to each technology improvement. Select a technology you use every day and c
    5·1 answer
  • All web page urls begin with the letters ____.
    6·1 answer
  • A packet analyzer is a program that can enable a hacker to do all of the following EXCEPT ________. Select one: A. assume your i
    6·1 answer
  • How does the Rights Management Services feature help to protect information
    11·1 answer
  • When an EC2 instance is being modified to have more RAM, is this considered Scaling Up or Scaling Out?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!