1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
AlladinOne [14]
3 years ago
6

Who has access to the source code of proprietary software

Computers and Technology
1 answer:
Nutka1998 [239]3 years ago
3 0

Source code is the basic component of a computer program and it is the only component where a programmer can read and modify a computer program. The source code for proprietary software is closed. Only the programmers who have made the software have access to the source code.

You might be interested in
Suppose Alice uses the RSA system with a very large modulus n for which the factorization cannot be found in a reasonable amount
Yuliya22 [10]

Answer:

Encryption method security:-

  • Encryption method representing each alphabetic character as an integer between 0 and 25.
  • Now, apply RSA algorithm for each integer is not an efficient secure encryption method.

Explanation:

  • Let consider alphabetic characters set {A, B... Z} .
  • Each alphabetic character forms a set of message block values M={0,1,2...,25).
  • From encryption method the corresponding cipher text block value C = {0e mod n,1e mod n, 2e mod n,..., 25e mod n}.
  • Then, compute the cipher text with knowledge of Bob's public key;
  • If the public key is generated, then possibility to decrypt the cipher text to plain text.
  • The generated public key is easily calculated by everyone and security is lost.
  • Therefore, the encryption method is not secure.

Encryption method is not secure, Most efficient attack against this method:-

  • Now, compute the encryption message with the function Me mod n for all the possible values of M.
  • This is the most efficient attack against the scheme in encryption method.
  • Then, create a look-up table with cipher text as an index to the corresponding plain text as a value for appropriate location in the table.
4 0
3 years ago
Write a function called count_vowels that accepts a string argument that represents a word and returns the number of vowels that
stellarik [79]

Answer:

public static int count_vowels(String str){

       String word = str.replaceAll("[^a-zA-Z0-9]", "");

       String text = word.toUpperCase();

       int lenOfString = text.length();

       int count =0;

       for(int i =0; i<lenOfString; i++){

           if(text.charAt(i)=='A'||text.charAt(i)=='E'||text.charAt(i)=='I'

                   ||text.charAt(i)=='O'||text.charAt(i)=='U'){

               count++;

           }

       }

       return count;

   }

Explanation:

This has been implemented using Java programming language.

Firstly, white spaces, special characters and punctions are removed from the string uisng the replaceAll() method

The string is converted to all upper cases

a for loop is used to count the number of vowels and store to a variable count

In the main method a call to count_vowels is done

<em>public class num1 {</em>

<em>    public static void main(String[] args) {</em>

<em>        String name = "David %$ !. gjak";</em>

<em>        System.out.println("The number of vowels in "+name+ " are "+count_vowels(name));</em>

<em>    }</em>

<em>    public static int count_vowels(String str){</em>

<em>        String word = str.replaceAll("[^a-zA-Z0-9]", "");</em>

<em>        String text = word.toUpperCase();</em>

<em>        int lenOfString = text.length();</em>

<em>        int count =0;</em>

<em>        for(int i =0; i<lenOfString; i++){</em>

<em>            if(text.charAt(i)=='A'||text.charAt(i)=='E'||text.charAt(i)=='I'</em>

<em>                    ||text.charAt(i)=='O'||text.charAt(i)=='U'){</em>

<em>                count++;</em>

<em>            }</em>

<em>        }</em>

<em>        return count;</em>

<em>    }</em>

<em>}</em>

<em />

The complete program with a Main method is given below

3 0
3 years ago
Lonic compounds are also known as <br> a. salts <br> b. valence <br> c.organic <br> d.elements
shutvik [7]
I'm not quite sure but it maybe b
6 0
4 years ago
Read 2 more answers
PLEASE ANYONE!!which present margins would be best to get the most information to fit on the page​
-Dominant- [34]

Answer:

Normal Margin is fit on the page. The default margins for Microsoft Word is normal margin.                                      

Explanation:

The paper visual effect give the document’s theme and quality. Margins send visual effects. Making a document right helps you to send the right message to readers. Use a small paper and adding a border.

You can change the page layout that people notice first with size, orientation, and margins.

Page margins make your document readable. Margins make the document more readable, make text look inviting, and given reviewers.

With narrower margins, you can reduce more words on-page.

To many words in a line make it difficult to read the document.

Margins are of many types

  • Normal Margin
  • Narrow margins
  • Moderate margins
  • Wide margins

Normal gives an equal inch to all sides of the page.

Narrow margins give little room to each column.

Average margins squeeze words from left and right.

Wide gives space when proofing the manuscript.

3 0
3 years ago
Read 2 more answers
What would be the time complexity of the add operation if we chose to add at the end of the list instead of the front?
Sav [38]

Answer:

O(n)

Explanation:

If we chose to add an element at the end of the list instead of the front, the add operation will have a time complexity of O(n) where 'n' represents the number of existing elements of the list. This is because the operation will involve iterating through the entire list of size n via pointers and adding the new element at the end. So the time complexity will be n*O(1) or O(n).

5 0
3 years ago
Other questions:
  • How do you use the Internet? Think about your typical day. When are you using the Internet? For what purposes? What role does it
    11·1 answer
  • We can log on to computer or to network through s creen<br>​
    7·1 answer
  • What is similar software engineering, Hardware engineer, Network Architect, and Web developer?
    11·1 answer
  • The ........ tag is used to create a link to another document​
    9·1 answer
  • 2. (8 points) When creating the Academic Database, there were several instances of data
    11·1 answer
  • What happens if the user sysadmin invokes the mail command interface and there are no unread mail messages?
    13·1 answer
  • You have been asked to provide an account for an outside consultant, who needs limited access to the network for a very short pe
    10·1 answer
  • How do operating system work?
    5·1 answer
  • Which type of application architecture has a logic tier
    15·2 answers
  • Hello! I hope you have a great day! Good things will come your way.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!