1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alex_Xolod [135]
3 years ago
6

When you access the programs and documents on a computer by what way of icons is said to be employing

Computers and Technology
1 answer:
Igoryamba3 years ago
7 0
What is the options to choose from and i can give u a correct answer 
You might be interested in
)
I am Lyosha [343]

Photo metadata

Hope this helps

5 0
3 years ago
To write on a cd-rw disc, users must have cd-rw software and a cd-rw ____.
Karo-lina-s [1.5K]
Hello there!

It would be A cd - rw Drive.

Hope This Helps You!
Good Luck :)
4 0
3 years ago
Which job qualifications are typical for someone who wants to work in Information Support and Services?
trapecia [35]

Answer:

The Answer Is A.) math skills, communication skills, time management skills

Explanation:

Information Support and Services Qualifications

Common qualifications include:

• problem-solving, math, logic, and critical-thinking skills for reasoning through problems.

• time-management and organizational skills for planning, scheduling, and prioritizing

projects.

• the ability to break down large projects into small pieces and tasks.

• creativity for coming up with ideas and designs and flexibility for adjusting to changes.

• knowledge of computers, software, and related tools and equipment.

• teamwork and communication skills for coordinating with, teaching, and listening to

others.

• leadership skills for supervising others and stress-management skills for handling

responsibility.

• independence for staying focused when working alone and for making decisions.

• the ability to learn quickly and to keep knowledge and skills current with new technologies

4 0
2 years ago
Read 2 more answers
Hi, what’s up, im really bored and have nothing to do
xenn [34]
Hey, i’m really bored too. Hope this helps
6 0
3 years ago
Read 2 more answers
100 POINTS!!!!!!
Veronika [31]

Answer:

The fundamental limitation of symmetric (secret key) encryption is ... how do two parties (we may as well assume they are Alice and Bob) agree on a key? In order for Alice and Bob to communicate securely they need to agree on a secret key. In order to agree on a secret key, they need to be able to communicate securely. In terms of the pillars of IA, To provide CONFIDENTIALITY, a secret key must first be shared. But to initially share the key, you must already have CONFIDENTIALITY. It's a whole chicken-and-egg problem.

This problem is especially common in the digital age. We constantly end up at websites with whom we decide we want to communicate securely (like online stores) but with whom we there is not really an option to communicate "offline" to agree on some kind of secret key. In fact, it's usually all done automatically browser-to-server, and for the browser and server there's not even a concept of "offline" — they only exist online. We need to be able to establish secure communications over an insecure channel. Symmetric (secret key) encryption can't do this for us.

Asymmetric (Public-key) Encryption

Yet one more reason I'm barred from speaking at crypto conferences.

xkcd.com/177/In asymmetric (public key) cryptography, both communicating parties (i.e. both Alice and Bob) have two keys of their own — just to be clear, that's four keys total. Each party has their own public key, which they share with the world, and their own private key which they ... well, which they keep private, of course but, more than that, which they keep as a closely guarded secret. The magic of public key cryptography is that a message encrypted with the public key can only be decrypted with the private key. Alice will encrypt her message with Bob's public key, and even though Eve knows she used Bob's public key, and even though Eve knows Bob's public key herself, she is unable to decrypt the message. Only Bob, using his secret key, can decrypt the message ... assuming he's kept it secret, of course.

Explanation:

3 0
2 years ago
Other questions:
  • Radiation requires a heated liquid to transfer energy. Please select the best answer from the choices provided T F
    10·2 answers
  • What describes the basic transaction data such as its date, purpose, and amount and includes cash receipts, canceled checks, inv
    13·1 answer
  • Compare and contrast the following network types: Personal Area Network (PAN) Local Area Network (LAN) Metropolitan Area Network
    14·1 answer
  • What are the two most popular applications of theInternet?
    7·1 answer
  • With a(n) ______, a search engine will show ads that have the keyword typed exactly as the searcher used, but may also have othe
    6·1 answer
  • JPG is considered a lossy file format. What does this mean?
    15·2 answers
  • Select the statement which most accurately describes the benefits and drawbacks of working from home and telecommuting.
    13·2 answers
  • Assessment
    12·1 answer
  • Rita tried unsuccessfully to open a PDF file attachment in her Inbox by double-clicking the attachment in the Reading Pane. What
    8·1 answer
  • Ten ways ict has helped in social development
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!