1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
pentagon [3]
3 years ago
8

Which is the fastest method of sharing public folders?

Computers and Technology
1 answer:
Rasek [7]3 years ago
3 0

Answer:

I'm stuck on this but the correct answers I would at-least pick is A and C I need more information about what operating system you have on the computer.

You might be interested in
When working on developing an ability, it is important to get feedback to know how you are doing.
alexgriva [62]

Answer:

T

Explanation:

You don't want to learn a skill incorrectly.

6 0
3 years ago
The algorithm credited to Euclid for easily finding the greatest common divisor of two integers has broad significance in crypto
Len [333]

Answer:

a. True                      

Explanation:

  • Euclid's algorithm for finding greatest common divisor of two integers is a very effective method which has importance in cryptography as it is being used in cryptographic schemes and algorithms.
  • This algorithm calculates gcd of  2 integers which is the largest number which divides both the integers.
  • The famous RSA public-key encryption technique also uses extended version of this algorithm to compute modular multiplicative inverse
  • Euclid algorithm is also used in Chinese remainder theorem.
  • This algorithm is not only used in cryptographic algorithm but is also used in breaking these cryptosystems using prime factorization as we know that factorization of large integers is very tough and the security of many cryptography systems depends on this.
5 0
3 years ago
Can you help me with this question please ​
Flura [38]
D. half period because it is the converting of bidirectional current flow to unidirectional currency flow.
3 0
3 years ago
While Angela is making modifications to Katie’s Word document, she would like to inform Katie of the reasoning for the change. W
Ostrovityanka [42]

Answer:

Email would work

6 0
3 years ago
In cell B20, enter a
zzz [600]

Answer:

かあなたは棚田やヌタほたややあはあやあやあさあ与田弥太は沙汰やあはあわあね、田やホワアラハやくださいヤアカやさ矢田かほあや体は白湯のやさた

Explanation:

なたさたらなやさゆなやさら

5 0
2 years ago
Other questions:
  • What is the final step used when designing an algorithm?
    14·1 answer
  • Suppose your SOHO network connects to the Internet using cable modem. When you open your browser and try to access a web site, y
    8·1 answer
  • How does LinkedIn differ from other popular social media platforms? What are the similarities?
    6·1 answer
  • Where is a 3D modeler most likely to work?
    6·1 answer
  • Which of the following is a job description for a person with a degree in information technology
    15·1 answer
  • According to the "multiple-selves" theory, of an online DVD rental service could offer same-day deliveries, so that people who o
    9·1 answer
  • How is a UDP socket fully identified? What about a TCP socket? What is the difference between the full identification of both so
    9·1 answer
  • What is a trojan horse
    8·2 answers
  • What are the specifications for a mine shaft headgear ​
    10·1 answer
  • 4. The volume of a sphere is (4.0/3.0)rr3 and the surface area is 4.0rr2, where r is the radius of
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!