1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
scoundrel [369]
3 years ago
15

Two or more connnected computers

Computers and Technology
2 answers:
Aloiza [94]3 years ago
8 0

yes i think you didnt really give me much to work with but i would say yes

konstantin123 [22]3 years ago
5 0

Answer:

a pc and a cpu ram disk drive

hope it helps

You might be interested in
Counting calculus students. About A university offers 3 calculus classes: Math 2A, 2B and 2C. In both parts, you are given data
OleMash [197]

Answer:

Part (a) n(A∩B∩C) = 4

Part (b) n(A∪B∪C) = 54

Explanation:

n(A) = no. of students who took Math 2A

n(B) = no. of students who took Math 2B

n(C) = no. of students who took Math 2C

n(A∩B) = no. of students who took both Math 2A and 2B

n(A∩C) = no. of students who took both Math 2A and 2C

n(B∩C) = no. of students who took both Math 2B and 2C

n(A∩B∩C) = no. of students who took all three Math 2A, 2B and 2C

n(A∪B∪C) = no. of total students in a group

∩ represents Intersection and ∪ represents Union

Part (a)

n(A∪B∪C) = n(A) + n(B) + n(C) - n(A∩B) - n(A∩C) - n(B∩C) + n(A∩B∩C)  

Where n(A∩B∩C) represents the number of students who took all three classes and n(A∪B∪C) represents the total number of students in group A

157 = 51 + 80 + 70 - 15 - 20 - 13 + n(A∩B∩C)

Re-arranging the equation to solve for n(A∩B∩C) since we want to find out those students who took all three classes

n(A∩B∩C) = 157 - 51 - 80 - 70 + 15 + 20 + 13

n(A∩B∩C) = 4

So there are 4 students in group A who took all three classes

Part (b)

n(A∪B∪C) = n(A) + n(B) + n(C) - n(A∩B) - n(A∩C) - n(B∩C) + n(A∩B∩C)

This time we are given n(A∩B∩C) students who took all three classes and want to find n(A∪B∪C) that is total number of students

n(A∪B∪C) = 28 + 28 + 25 - 11 - 9 - 10 + 3

n(A∪B∪C) = 54

So there are total 54 students in group B

8 0
3 years ago
Anyone wanna hop on 1v1.lol<br> party code : usfhb6
hjlf

Answer:

thx for the points

Explanation:

8 0
3 years ago
Read 2 more answers
Mary wants to send a message to Sam in such a way that only Sam can read it. Which key should be used to encrypt the message
barxatty [35]
Sam’s Public Key. Hope it helps)
6 0
3 years ago
Write an instance method in Rational called add that takes a Rational number as an argument, adds it to this, and returns a new
ExtremeBDS [4]

Answer:

Explanation:

I do not have the Rational class but based on the information provided, the following class has been tested and does what is requested. It can simply be added to the Rational class and it will work fine. Due to technical difficulties I had to add the instance method as an attachment in a text file down below.

Download txt
8 0
3 years ago
​which type of cryptography provides the most security?
Doss [256]

Answer B: Asymmetric cryptography, because the receiver has its own decryption key and cannot create encrypted messages, because he doesn't have the encryption key.

About the other answers:

A: Private keys are always involved, there has to be some secret to do encryption, so this answer doesn't say very much.

C: Digital signatures can be used to verify/prove some data comes from some person (the signer) in an unaltered way. It is not about encryption, so is not about the security of your message. You use it in combination with encryption.

D: Like A, this doesn't say very much. Shared secret keys (symmetric keys) can be used for encryption, but they are less secure since the keys have to exist in more than one place (sender and receiver).



4 0
3 years ago
Other questions:
  • This solution will use an item quantity and a state code to calculate the total price of an item. The solution will calculate th
    10·1 answer
  • Which description best describes how mass spectroscopy is useful in the field of forensic toxicology
    6·1 answer
  • In the single-site processing, single-site data (SPSD) scenario, all processing must be done on the end user's side of the syste
    10·2 answers
  • For businesses and organizations under recent compliance laws, data classification standards typically include private, confiden
    11·1 answer
  • Imagine that a company is having trouble assuring its bills are paid on time. An effective solution will
    13·1 answer
  • A ___________ assigns levels of risk to various threats to network security by comparing the nature of the threats to the contro
    9·1 answer
  • . Which one of the following is not a JAD participant? 1. Managers 2. System analyst 3. Business development manager 4. Users
    7·1 answer
  • Which of these exemplifies an iterative process
    15·2 answers
  • What computing paradigm can solve a problem by describing the requirements, without writing code in a step-wise fashion to solve
    8·1 answer
  • On the worksheet, make cell a1 the active cell and then simultaneously replace all occurrences of the value 0. 05 with the value
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!