1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lemur [1.5K]
3 years ago
6

Which finger types the return or enter key?

Computers and Technology
2 answers:
levacccp [35]3 years ago
8 0
Usually the ring finger
insens350 [35]3 years ago
7 0

the duck says ring fanger :v

(btw yes i meant fanger to be funny)

You might be interested in
The __________ cipher is a method of encrypting alphabetic text by using a series of different monoalphabetic ciphers selected b
Free_Kalibri [48]

Answer:

Vigenère

Explanation:

It is a method of encrypting alphabetic text by using a form of polyalphabetic substitution. A polyalphabetic cipher is any cipher based on substitution, ie using multiple substitution of alphabets. The encryption is done using a Vigenère table.

To encrypt a message using the Vigenère Cipher you choose a keyphrase. Then repeat this keyword over and over until it is the same length as the original text; this is referred to as a keystream.

4 0
3 years ago
what is the restaurant with the black pom tree and yellow backround three letter name from hi guess the restaurant
vekshin1
In 'N' Out, and KFC (Kentucky Fried Chicken)
7 0
3 years ago
Read 2 more answers
The Security Development Life Cycle (SDLC) is a general methodology for the design and implementation of an information system.
navik [9.2K]

Answer:

False

Explanation:

The Security Development Life Cycle (SDLC), is a software development which involves traditional approach towards its design such as, waterfall model, Agile, etc.

It can either be referred to as a generic secure development life cycle or a specific one, such as the Microsoft SDL or the Cisco SDL.

Its phases includes,

A1 - Security Assessment

A2 - Architecture

A3 - Design and Development 1

A4 - Design and Development 2

A5 - Ship

PRSA - Post Release

Each phase talks about how a secured software is developed.

The Security Development Life Cycle (SDLC) is a general methodology for the design and implementation of an information system. This statement is false because by definition and attributes Security Development Life Cycle is a traditional approach towards software development and not a general method.

6 0
2 years ago
You want to allow members of the users group to use fdisk on the /dev/sda drive (and only that drive) and to use the yum command
masya89 [10]

Answer:

su ,sg and sudo command.

Explanation:

Whenever the user needs to enable workgroup mates should use fdisk including just that disk on both the /dev / sda disk, using the following command to update and configure the following packages. Thus he uses the command su, sg, and sudo.

So, the following commands are required according to the following statement.

6 0
3 years ago
1.the following code example would print the data type of x, what data type would that be?
natta225 [31]

Answer:

x = 5, the data type is integer( integer data type is for whole numbers)

2. The data type is string

3. The data type is float (float data type is for decimals)

Explanation:

6 0
3 years ago
Other questions:
  • What is the purpose of a title slide on power point
    14·2 answers
  • Discuss why mtv initially had a difficulty securing enough ads
    10·1 answer
  • 8. A pattern of being late for work or for appointments is usually
    12·1 answer
  • A(n) ________ is a variable that receives an argument that is passed into a function. global argument scope parameter
    15·1 answer
  • No matter what medium connects computers on network-copper wires, fiber-optic cables, or a wireless setup; the same protocol mus
    11·1 answer
  • Which tasks can be completed using the Chart Tools Design tab? Check all that apply.
    5·1 answer
  • What type of photography is represented by a photograph of a dog on a beach ?
    11·1 answer
  • Plain text and ASCII text are the same thing. true or false
    12·1 answer
  • 8.7 lesson practice question 1
    13·1 answer
  • Please help thank u!!!!!
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!