1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
statuscvo [17]
3 years ago
12

Imagine that you need to be late to work next Thursday because of a doctor's appointment. Compose your own e-mail appropriate fo

r the workplace that explains this to your boss.
Computers and Technology
1 answer:
ratelena [41]3 years ago
8 0
In form your boss a week early
You might be interested in
Which of the following is true about database queries?
8_murik_8 [283]

Answer:D

Queries are always saved and can therefore be run on the most up-to-date database information

4 0
3 years ago
When cleaning a computer, you need only worry about what you can see.
icang [17]

Answer:

No

Explanation:

Somethimg yu cant see are important

5 0
3 years ago
What is the purpose of an IP address? A. identifying source and destination of data B. creating images on websites C. drawing ta
natka813 [3]

Answer:

The Answer is A. I could be wrong though.

3 0
3 years ago
Read 2 more answers
Jeff was explaining to a friend the importance of protecting a cryptographic key from cryptoanalysis. He said that the key shoul
Lisa [10]

Answer:

Jeff is describing confusion

Explanation:

In 1945, Claude Shannon gave a classified report on: "Mathematical Theory of Cryptography" where he stated that confusion and diffusion are two properties of the operation of a secure cipher which are very essential in cryptanalysis.

When each bit of the ciphertext depends on several parts of the key, secluding the connections between the ciphertext and the key, it is known as confusion.

Hence, Jeff saying that the key should not relate in a simple way to the cipher text describes confusion.

7 0
3 years ago
Training programs vary in length but in general take less than _____ years to complete.
Nezavi [6.7K]

Answer:

2 years

Explanation:

8 0
4 years ago
Other questions:
  • Cell C2 contains the formula "=10+D3". If you copied C2 to A1, what would be the formula in A1? =10+B2 =10+F2 =10+B4 =10+F4
    14·1 answer
  • Which of the following is NOT a view which can be chosen for a presentation?
    15·1 answer
  • ____ port is a connection in which eight data lines transmit an entire byte of data at one moment in time.
    12·1 answer
  • A company that offers services for accessing and using the Internet is: *
    10·1 answer
  • Extended ACLs can filter traffic based on _____. (Points : 3) protocol type
    8·1 answer
  • Which of the following declares an abstract method in an abstract C++ class? (Points : 2) public: void print();
    14·1 answer
  • 2.1. The stream cipher described in Definition 2.1.1 can easily be generalized to work in alphabets other than the binary one. F
    10·1 answer
  • In which of the following careers are you most likely to do an apprenticeship?
    14·2 answers
  • Match the title of the work of fiction to the description given.
    8·1 answer
  • Hattie uses the line of code num == 7 to assign the number 7 to the variable named num. What correction should be made?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!