1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Virty [35]
4 years ago
13

Encryption turns data into a form known as a ____.

Computers and Technology
1 answer:
tigry1 [53]4 years ago
8 0
Cipher is the correct answer
You might be interested in
¿Qué podría pasar si los avances tecnológicos cayeran en personas sin formación Ética-Moral?
timurjin [86]

Answer:

If technological advances fall on people without Ethical-Moral training, then life itself would be threatened as our humanity and environment would be destroyed.

Explanation:

Question:

What could happen if technological advances fell on people without Ethical-Moral training?

Morals: Morals refer to human behavior. The principles of right and wrong

Ethics: It is the body of rules and regulations that dictate the conduct of practitioners of a particular profession.

In terms of technology, ethics is viewed in two contexts; if the pace of technological innovation is benefiting the humanity or not; if it is severely empowering people while choking others in the process.

Technology: it is the application of scientific principles for practical purposes of human life. Technology when used properly improves the quality of life of people.

On one hand, technology in itself is said to be neither good nor bad. It is people who determine it's application. With this said, we can infer that if technology falls on the wrong hands, it could be disastrous.

On the other, some technologies like nuclear fission, genetic engineering exert enormous power that their existence raises ethical or moral questions.

The role of ethical training in technological advancement would be to monitor rather than control to ensure fair practices.

Now if technological advances fell on people without ethical-moral training, then life itself would be threatened:

- Cultural breakdown: Almost everything in our day to day lives would depend on technology

- Loss of jobs: this would happen when machines do the work of men

- Inequalities as those with initial access to it would be the rich thereby widening the gap between the rich and poor.

- Exploitation as competition towards Mastery and control increases

- Environmental degradation

5 0
3 years ago
Why does a layer 3 device perform the anding process on a destination ip address and subnet mask?
mafiozo [28]
To get the network number and node number of the destination machine. The subnet mask is usually called the NETwork MASK, so anding it with the address gives you the network number. Using the not logical operator on the netmask then protects the node bits in a second and operation.

address & netmask = network number
address & not( netmask ) = node number

The not operator essentially just flips the bits of it's argument.
8 0
3 years ago
Consider the following declaration:
Mnenie [13.5K]

Answer:

cool

Explanation:

6 0
3 years ago
Which of the following is a responsibility of CTSO membership?
Leni [432]

Answer:conducting yourself appropriately and professionally

Explanation:

2021 edg

7 0
2 years ago
A technician looks at a motherboard and sees a 24-pin connector. What component would connect to the motherboard through the use
Firlakuza [10]
<h2>Power supply connects to the motherboard through the use of the 24 pin connector.</h2>

Explanation:

Power supply

  • is an electrical device
  • source of it come from electrical grid
  • ability to convert different form of energy (solar, mechanical & chemical) to electrical energy
  • Converts main AC voltage to low-voltage current
  • 3 types - linear voltage, switch, unregulated
  • It is also called PSU unit (Power supply unit)
  • have to protect from over current, high voltage, etc
  • Mandatory for laptop to charge and use later
4 0
3 years ago
Other questions:
  • Questions 6 - 9 Refer to the following code: public class WhatsIt { private int[] values; private double average; public WhatsIt
    7·1 answer
  • You need to write th java syntax for the expression “7 is greater than or equal to 3” choose the best answer
    8·1 answer
  • Helen has no experience in security. She would like to earn a certification that demonstrates that she has the basic knowledge n
    15·1 answer
  • The while loop has two important parts: an expression that is tested for a true or false value, and:
    11·1 answer
  • Research different ways that 3D printing is used in society. Tell us about the items that are 3D printed.
    8·2 answers
  • Which is an operational process performed by AWS for data security? a.Background virus scans of EBS volumes and EBS snapshots
    8·1 answer
  • True or False?If you live in a country that uses censorship,you may not be able to access certain websites.ONLY ANSWER IF UR 100
    9·2 answers
  • When protecting a worksheet all cells are locked by default.?
    10·1 answer
  • What is the most efficient way to prevent the spelling checker from repeatedly flagging a correctly spelled name in all of your
    5·1 answer
  • The __________ on a mouse is used to select or place the cursor where you want on the page
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!