1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
s2008m [1.1K]
3 years ago
10

Help with what the awnser is

Computers and Technology
1 answer:
wariber [46]3 years ago
8 0
Flute on a boot ;) hope i helped

You might be interested in
What type of security solution provides a hardware platform for the storage and management of encryption keys?
shutvik [7]

The type of security solution provides a hardware platform for the storage and management of encryption keys exists hardware security modules .

Hardware security modules (HSMs) supply an effective method to control encryption keys.

<h3>What are Hardware security modules?</h3>

A hardware security module (HSM) exists as a physical machine that supplies extra security for sensitive data. This kind of device exists utilized to require cryptographic keys for essential functions such as encryption, decryption, and authentication for the usage of applications, identities, and databases.

The hardware usually costs at least USD 20,000 to deploy, USD 40,000 for increased accessibility, and multiple periods better for normal enterprise deployment.

Hardware Security Modules (HSMs) exist in hardened, tamper-resistant hardware appliances that strengthen encryption techniques by developing keys, encrypting and decrypting data, and designing and demonstrating digital signatures.

A Hardware Security Module (HSM) exists as a hardware-based protection appliance that develops, stores, and protects cryptographic keys. Sterling Secure Proxy utilizes keys and certificates stored in its store or on an HSM.

To learn more about Hardware Security Module refer to:

brainly.com/question/24118720

#SPJ4

7 0
2 years ago
Write a recursive method that takes four inputs: a 1-D array of Strings (i.e., exams), the length of this 1-D array (i.e., n), a
ale4655 [162]

Answer:

import java.util.*;

public class Main

{

       public static void main(String[] args)  

       {

           String [] exams = {"1;2;3;4;" , "5;6;7;8;" , "9;10;11;12;" };

           double[][] n = new double[exams.length][4];

           examArray = convert(exams , exams.length , 0 , n);

           for(int i = 0 ; i < exams.length ; i++)

           {

               for(int j = 0 ; j < 4 ; j++)

               {

                   System.out.print(n[i][j] + "\t");

               }

              System.out.print("\n");

           }

       }    

       

/* recursive function convert defined here */

       public static double[][] convert(String[] exams , int number , int x , double [][] result)

       {

           if(x==number)

               return result;

           else

           {

               String total = exams[x];  

               String currentScore = "";

               int p = 0;

               for(int j = 0 ; j<totalScore.length() ; j++)

               {

                   char ch = total.charAt(j);/

                   if(ch==';')

                   {

                       result[x][p] = Double.parseDouble(currentScore);

                       p++;

                       currentScore = "";

                   }

                   else

                   {

                       currentScore = currentScore + Character.toString(ch);

                   }

               }

               return convert(exams , number , x+1 , result);

           }

           

       }

}

Explanation:

The Java source code defines a recursive function or method called convert that converts the results of three students that sat for four examinations to double or float number and screens their individual results for the four exams on the screen.

5 0
3 years ago
2. Voltage is:
jenyasd209 [6]
A. The force that moves electrons
6 0
3 years ago
What does Joann need to change in her outline?
Alona [7]
Where’s the outline?
6 0
3 years ago
Read 2 more answers
Difference between volatile and non volatile memory
slega [8]
<span>Volatile memory requires electricity or some kind of current to store information, and nonvolatile memory does not.</span>
6 0
3 years ago
Read 2 more answers
Other questions:
  • What are the two components that make up the chipset?
    15·1 answer
  • Which phase takes all the detailed design documents from the design phase and transforms them into the actual system? Testing ph
    7·1 answer
  • How to learn how to use computers
    9·1 answer
  • Mike wants to build an amplifier. which technology can he use?
    6·1 answer
  • HELP ME WITH JAVA: This is my assignment. I need to write a program with a main method and methods. Use a scanner to get the Str
    5·1 answer
  • The UML models operations by listing the operation name preceded by an access modifier. A(n) ________ indicates a public operati
    7·2 answers
  • Simone frequently downloads mobile apps from Amazon Appstore. What operating system does she have on her smartphone?
    6·1 answer
  • How do you change the color on the text in the email​
    6·1 answer
  • Who is the father of computer?​
    6·1 answer
  • QUESTION 8
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!