1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
liq [111]
3 years ago
14

Why is voice encryption an important digital security measure?

Computers and Technology
1 answer:
NISA [10]3 years ago
4 0

Answer: Voice encryption is the end to end encryption/encoding of the the communication taking place through the telephone or mobile devices. The encryptors of voice turn the communication conversation into the digital form which result in stream of bits.

Digital security is the protection and securing of the  devices related with the mobile and online technology. It is important to maintain the security of the information conveyed through the communication. It maintains the protection from the online stealing of the data and fraud.

You might be interested in
The function below takes two arguments: a dictionary of strings (keys) to integers (values) a_dict and a list of strings key_lis
vitfil [10]

Answer:

  1. def getData(a_dict, key_list):
  2.    result = []
  3.    for key in key_list:
  4.        result.append(a_dict[key])
  5.    
  6.    return result  
  7. result = getData( {"puffin": 5, "corgi": 2, "three": 3} , ["three", "corgi"])
  8. print(result)

Explanation:

Let's define a function <em>getData() </em>with two parameters,<em> a_dict </em>and <em>key_list</em> as required by the question (Line 1).

Since the function is to return a list of associated values of dictionaries, a new list,<em> result</em>,  is declared and initialized with empty values (Line 2).

Next, use for-loop to traverse through every string in the input <em>key_list </em>(Line 4) and use the traversed key to address the value in the<em> a_dict </em>and add it to the <em>result</em> list (Line 5)

At last, return the <em>result </em>list as output (Line 7)

We can test the function using the test case from the question and we shall see the output as follows:

[3, 2]

8 0
3 years ago
A software repository, also known as a 'repo'
Step2247 [10]
A software repository is a storage location for software packages. Often a table of contents is also stored, along with metadata. A software repository is typically managed by source control or repository managers.

I hope this helps
7 0
2 years ago
You were recently hired by a small start-up company. The company is in a small office and has several remote employees.
Romashka [77]

Answer:

D) IaaS

Explanation:

In this scenario, the best cloud service model would be IaaS. This stands for Infrastructure as a service (IaaS) and basically provides all the physical infrastructure that a company needs virtually. The company itself purchases a piece of software that allows them to remotely use all of the infrastructure provided by the service. Meaning they have access to computing power, data centers space, servers, networking, etc. without actually purchasing any of the physical hardware. This would solve all of "your" business needs as asked by the company.

6 0
3 years ago
Quand on veut, on .<br> veut<br> doit<br> arrive<br> peut
Talja [164]

<em>Bonjour,</em>

<em />

<em>Quand on veut, </em>on peut.

Verbe "pouvoir" au présent :

<em>je peux</em>

<em>tu peux</em>

<em>il, elle, </em>on  peut

<em>nous pouvons</em>

<em>vous pouvez</em>

<em>ils, elles peuvent</em>

7 0
2 years ago
Analyze,understand and interpret these picture​
Ganezh [65]

Answer:

hi

Explanation:

As you can see in the picture, only books can save a person who spends a lot of time on social networks and on the phone. Because some people lose valuable time just by doing nonsense on social media. Books can save us.

hope it helps

have a nice day

6 0
2 years ago
Other questions:
  • What types of data are commonly entered into a cell ?
    7·2 answers
  • The length of a pencil would most likely be measured in:
    9·2 answers
  • Wide area networks are defined by their ability to
    14·2 answers
  • 2
    9·2 answers
  • In full screen reading view the blank is reduced
    5·1 answer
  • Instructions:Select the correct answer.
    8·2 answers
  • 1. What does a network allow computers to share?
    13·1 answer
  • Research and build a chroot jail that isolates ssh users who belong to the restrictssh group. (You will also need to create the
    9·1 answer
  • Consider this binary search tree:______.
    12·1 answer
  • What's the biggest security issue with using social networking sites to market your listings?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!